Sciweavers

19320 search results - page 3789 / 3864
» On the complexity of computing determinants
Sort
View
SACMAT
2009
ACM
15 years 2 months ago
A formal framework to elicit roles with business meaning in RBAC systems
The role-based access control (RBAC) model has proven to be cost effective to reduce the complexity and costs of access permission management. To maximize the advantages offered...
Alessandro Colantonio, Roberto Di Pietro, Alberto ...
GECCO
2009
Springer
258views Optimization» more  GECCO 2009»
15 years 2 months ago
Evolutionary learning of local descriptor operators for object recognition
Nowadays, object recognition is widely studied under the paradigm of matching local features. This work describes a genetic programming methodology that synthesizes mathematical e...
Cynthia B. Pérez, Gustavo Olague
GECCO
2009
Springer
193views Optimization» more  GECCO 2009»
15 years 2 months ago
Optimization of dynamic memory managers for embedded systems using grammatical evolution
New portable consumer embedded devices must execute multimedia applications (e.g., 3D games, video players and signal processing software, etc.) that demand extensive memory acces...
José L. Risco-Martín, David Atienza,...
WILF
2009
Springer
196views Fuzzy Logic» more  WILF 2009»
15 years 2 months ago
Interactive Image Retrieval in a Fuzzy Framework
In this paper, an interactive image retrieval scheme using MPEG-7 visual descriptors is proposed. The performance of image retrieval systems is still limited due to semantic gap, w...
Malay Kumar Kundu, Minakshi Banerjee, Priyank Bagr...
ASIACRYPT
2001
Springer
15 years 2 months ago
Fully Distributed Threshold RSA under Standard Assumptions
The aim of this article is to propose a fully distributed environment for the RSA scheme. What we have in mind is highly sensitive applications and even if we are ready to pay a pr...
Pierre-Alain Fouque, Jacques Stern
« Prev « First page 3789 / 3864 Last » Next »