Sciweavers

2748 search results - page 502 / 550
» Modelling Fuzzy Sets Using Object-Oriented Techniques
Sort
View
127
Voted
CAISE
2010
Springer
15 years 3 months ago
Dynamic Authorisation Policies for Event-Based Task Delegation
Task delegation presents one of the business process security leitmotifs. It defines a mechanism that bridges the gap between both workflow and access control systems. There are tw...
Khaled Gaaloul, Ehtesham Zahoor, François C...
DASFAA
2010
IEEE
176views Database» more  DASFAA 2010»
15 years 3 months ago
Efficient Database-Driven Evaluation of Security Clearance for Federated Access Control of Dynamic XML Documents
Achieving data security over cooperating web services is becoming a reality, but existing XML access control architectures do not consider this federated service computing. In this...
Erwin Leonardi, Sourav S. Bhowmick, Mizuho Iwaihar...
134
Voted
ICASSP
2010
IEEE
15 years 3 months ago
Boosted binary features for noise-robust speaker verification
The standard approach to speaker verification is to extract cepstral features from the speech spectrum and model them by generative or discriminative techniques. We propose a nov...
Anindya Roy, Mathew Magimai-Doss, Sébastien...
130
Voted
JAIR
2006
110views more  JAIR 2006»
15 years 3 months ago
Domain Adaptation for Statistical Classifiers
The most basic assumption used in statistical learning theory is that training data and test data are drawn from the same underlying distribution. Unfortunately, in many applicati...
Hal Daumé III, Daniel Marcu
120
Voted
JUCS
2008
115views more  JUCS 2008»
15 years 3 months ago
A Service-oriented Process to Develop Web Applications
: Web applications are widely disseminated, but, traditional development methods for this type of application still require a substantial amount of new modeling and programming. Cu...
Fábio Zaupa, Itana Maria de Souza Gimenes, ...