Sciweavers

2748 search results - page 502 / 550
» Modelling Fuzzy Sets Using Object-Oriented Techniques
Sort
View
CAISE
2010
Springer
15 years 1 days ago
Dynamic Authorisation Policies for Event-Based Task Delegation
Task delegation presents one of the business process security leitmotifs. It defines a mechanism that bridges the gap between both workflow and access control systems. There are tw...
Khaled Gaaloul, Ehtesham Zahoor, François C...
DASFAA
2010
IEEE
176views Database» more  DASFAA 2010»
15 years 19 hour ago
Efficient Database-Driven Evaluation of Security Clearance for Federated Access Control of Dynamic XML Documents
Achieving data security over cooperating web services is becoming a reality, but existing XML access control architectures do not consider this federated service computing. In this...
Erwin Leonardi, Sourav S. Bhowmick, Mizuho Iwaihar...
ICASSP
2010
IEEE
15 years 18 hour ago
Boosted binary features for noise-robust speaker verification
The standard approach to speaker verification is to extract cepstral features from the speech spectrum and model them by generative or discriminative techniques. We propose a nov...
Anindya Roy, Mathew Magimai-Doss, Sébastien...
JAIR
2006
110views more  JAIR 2006»
14 years 11 months ago
Domain Adaptation for Statistical Classifiers
The most basic assumption used in statistical learning theory is that training data and test data are drawn from the same underlying distribution. Unfortunately, in many applicati...
Hal Daumé III, Daniel Marcu
JUCS
2008
115views more  JUCS 2008»
14 years 11 months ago
A Service-oriented Process to Develop Web Applications
: Web applications are widely disseminated, but, traditional development methods for this type of application still require a substantial amount of new modeling and programming. Cu...
Fábio Zaupa, Itana Maria de Souza Gimenes, ...