Sciweavers

341 search results - page 47 / 69
» On Stochastic Modeling for Integrated Security and Dependabi...
Sort
View
90
Voted
ACMICEC
2004
ACM
161views ECommerce» more  ACMICEC 2004»
15 years 5 months ago
The 2003 Supply Chain Management Trading Agent Competition
Supply Chain Management deals with the planning and coordination of bidding, production and procurement activities across the multiple organizations involved in the delivery of on...
Raghu Arunachalam, Norman M. Sadeh
ICFEM
2007
Springer
15 years 5 months ago
Formal Engineering of XACML Access Control Policies in VDM++
We present a formal, tool-supported approach to the design and maintenance of access control policies expressed in the eXtensible Access Control Markup Language (XACML). Our aim is...
Jeremy Bryans, John S. Fitzgerald
126
Voted
CRYPTO
2010
Springer
201views Cryptology» more  CRYPTO 2010»
15 years 25 days ago
Protecting Cryptographic Keys against Continual Leakage
Side-channel attacks have often proven to have a devastating effect on the security of cryptographic schemes. In this paper, we address the problem of storing cryptographic keys a...
Ali Juma, Yevgeniy Vahlis
TASLP
2011
14 years 6 months ago
Joint Estimation of Chords and Downbeats From an Audio Signal
—We present a new technique for joint estimation of the chord progression and the downbeats from an audio file. Musical signals are highly structured in terms of harmony and rhy...
Helene Papadopoulos, Geoffroy Peeters
ECIR
2009
Springer
15 years 9 months ago
A Comparative Study of Utilizing Topic Models for Information Retrieval
We explore the utility of different types of topic models for retrieval purposes. Based on prior work, we describe several ways that topic models can be integrated into the retrie...
Xing Yi, James Allan