Sciweavers

8636 search results - page 1476 / 1728
» How Developers Copy
Sort
View
168
Voted
AAAI
2011
14 years 3 months ago
Coarse-to-Fine Inference and Learning for First-Order Probabilistic Models
Coarse-to-fine approaches use sequences of increasingly fine approximations to control the complexity of inference and learning. These techniques are often used in NLP and visio...
Chloe Kiddon, Pedro Domingos
210
Voted
ACC
2011
164views more  ACC 2011»
14 years 3 months ago
IMS and Presence Service Integration on Intelligent Transportation Systems for Future Services
Once some stable solutions appear to be found at physical and network layers for cooperative Intelligent Transportation Systems (ITS), deploying vehicular services and managing the...
Andrés Garcia, José Santa, Antonio M...
ARESEC
2011
145views more  ARESEC 2011»
14 years 3 months ago
An Attribute Based Framework for Risk-Adaptive Access Control Models
—The concept of risk-based adaptive access control (RAdAC, pronounced Raid-ack) has been recently introduced in the literature. It seeks to automatically (or semi-automatically) ...
Savith Kandala, Ravi S. Sandhu, Venkata Bhamidipat...
CBMS
2011
IEEE
14 years 3 months ago
Sharing object models for multi-modality medical image simulation: A semantic approach
Medical image simulation produces virtual images from software representations of imaging devices and virtual object models representing the human body. Object models consist of t...
Germain Forestier, Adrien Marion, Hugues Benoit-Ca...
CCS
2011
ACM
14 years 3 months ago
Automated black-box detection of side-channel vulnerabilities in web applications
Web applications divide their state between the client and the server. The frequent and highly dynamic client-server communication that is characteristic of modern web application...
Peter Chapman, David Evans
« Prev « First page 1476 / 1728 Last » Next »