Sciweavers

272 search results - page 34 / 55
» Modelling the provenance of data in autonomous systems
Sort
View
ACSAC
2000
IEEE
15 years 1 months ago
Dynamic Access Control through Petri Net Workflows
Access control is an important protection mechanism for information systems. An access control matrix grants subjects privileges to objects. Today, access control matrices are sta...
Konstantin Knorr
ICAC
2006
IEEE
15 years 3 months ago
Learning Application Models for Utility Resource Planning
Abstract— Shared computing utilities allocate compute, network, and storage resources to competing applications on demand. An awareness of the demands and behaviors of the hosted...
Piyush Shivam, Shivnath Babu, Jeffrey S. Chase
IJCAI
1989
14 years 11 months ago
Integrating Knowledge-Based System and Neural Network Techniques for Robotic Skill Acquisition
This paper describes an approach to robotic control that is patterned after models of human skill acquisition. The intent is to develop robots capable of learning how to accomplis...
David Handelman, Stephen Lane, Jack Gelfand
CVPR
2006
IEEE
15 years 1 months ago
Multiple Face Model of Hybrid Fourier Feature for Large Face Image Set
The face recognition system based on the only single classifier considering the restricted information can not guarantee the generality and superiority of performances in a real s...
Wonjun Hwang, Gyu-tae Park, Jong Ha Lee, Seok-Cheo...
DILS
2005
Springer
15 years 3 months ago
Information Integration and Knowledge Acquisition from Semantically Heterogeneous Biological Data Sources
Abstract. We present INDUS (Intelligent Data Understanding System), a federated, query-centric system for knowledge acquisition from autonomous, distributed, semantically heterogen...
Doina Caragea, Jyotishman Pathak, Jie Bao, Adrian ...