Sciweavers

222 search results - page 41 / 45
» Mapping Java Objects to XML and Relational Databases
Sort
View
POLICY
2001
Springer
15 years 2 months ago
The Ponder Policy Specification Language
The Ponder language provides a common means of specifying security policies that map onto various access control implementation mechanisms for firewalls, operating systems, databas...
Nicodemos Damianou, Naranker Dulay, Emil Lupu, Mor...
75
Voted
VMV
2008
107views Visualization» more  VMV 2008»
14 years 11 months ago
Learning with Few Examples using a Constrained Gaussian Prior on Randomized Trees
Machine learning with few training examples always leads to over-fitting problems, whereas human individuals are often able to recognize difficult object categories from only one ...
Erik Rodner, Joachim Denzler
VVG
2003
205views Computer Vision» more  VVG 2003»
14 years 11 months ago
Digitisation to Presentation -  Building Virtual Museum Exhibitions
We describe an innovative system designed for museums to create, manage and present multimedia based representations of museum artefacts in virtual exhibitions both inside and out...
Manjula Patel, Martin White, Krzysztof Walczak, Pa...
SSPR
2010
Springer
14 years 8 months ago
An Empirical Comparison of Kernel-Based and Dissimilarity-Based Feature Spaces
The aim of this paper is to find an answer to the question: What is the difference between dissimilarity-based classifications(DBCs) and other kernelbased classifications(KBCs)?...
Sang-Woon Kim, Robert P. W. Duin
ICDM
2006
IEEE
176views Data Mining» more  ICDM 2006»
15 years 3 months ago
Razor: mining distance-constrained embedded subtrees
Due to their capability for expressing semantics and relationships among data objects, semi-structured documents have become a common way of representing domain knowledge. Compari...
Henry Tan, Tharam S. Dillon, Fedja Hadzic, Elizabe...