Sciweavers

805 search results - page 120 / 161
» On the Role of Integrity Constraints in Data Integration
Sort
View
SP
1997
IEEE
134views Security Privacy» more  SP 1997»
15 years 1 months ago
A Logical Language for Expressing Authorizations
A major drawback of existing access control systems is that they have all been developed with a specific access control policy in mind. This means that all protection requirement...
Sushil Jajodia, Pierangela Samarati, V. S. Subrahm...
AAAI
1993
14 years 11 months ago
Scientific Model-Building as Search in Matrix Spaces
Many reported discovery systems build discrete models of hidden structure, properties, or processes in the diverse fields of biology, chemistry, and physics. We show that the sear...
Raúl E. Valdés-Pérez, Jan M. ...
PAMI
2007
184views more  PAMI 2007»
14 years 9 months ago
Appearance Characterization of Linear Lambertian Objects, Generalized Photometric Stereo, and Illumination-Invariant Face Recogn
Traditional photometric stereo algorithms employ a Lambertian reflectance model with a varying albedo field and involve the appearance of only one object. In this paper, we gene...
Shaohua Kevin Zhou, Gaurav Aggarwal, Rama Chellapp...
CONEXT
2010
ACM
14 years 7 months ago
Auto-configuration of 802.11n WLANs
Channel Bonding (CB) combines two adjacent frequency bands to form a new, wider band to facilitate high data rate transmissions in MIMO-based 802.11n networks. However, the use of...
Mustafa Y. Arslan, Konstantinos Pelechrinis, Ioann...
JMLR
2010
149views more  JMLR 2010»
14 years 4 months ago
Learning Bayesian Network Structure using LP Relaxations
We propose to solve the combinatorial problem of finding the highest scoring Bayesian network structure from data. This structure learning problem can be viewed as an inference pr...
Tommi Jaakkola, David Sontag, Amir Globerson, Mari...