Sciweavers

1321 search results - page 236 / 265
» RIGR - A Repository Model Based Approach to Management
Sort
View
CCS
2008
ACM
15 years 4 months ago
User-controllable learning of security and privacy policies
Studies have shown that users have great difficulty specifying their security and privacy policies in a variety of application domains. While machine learning techniques have succ...
Patrick Gage Kelley, Paul Hankes Drielsma, Norman ...
KDD
2010
ACM
217views Data Mining» more  KDD 2010»
15 years 12 days ago
Mining program workflow from interleaved traces
Successful software maintenance is becoming increasingly critical due to the increasing dependence of our society and economy on software systems. One key problem of software main...
Jian-Guang Lou, Qiang Fu, Shengqi Yang, Jiang Li, ...
SIGMOD
2011
ACM
189views Database» more  SIGMOD 2011»
14 years 4 months ago
We challenge you to certify your updates
Correctness of data residing in a database is vital. While integrity constraint enforcement can often ensure data consistency, it is inadequate to protect against updates that inv...
Su Chen, Xin Luna Dong, Laks V. S. Lakshmanan, Div...
ICAC
2005
IEEE
15 years 7 months ago
Towards Autonomic Virtual Applications in the In-VIGO System
Grid environments enable users to share non-dedicated resources that lack performance guarantees. This paper describes the design of application-centric middleware components to a...
Jing Xu, Sumalatha Adabala, José A. B. Fort...
RIAO
2000
15 years 3 months ago
Speaker change detection using joint audio-visual statistics
In this paper, we present an approach for speaker change detection in broadcast video using joint audio-visual scene change statistics. Our experiments indicate that using joint a...
Giridharan Iyengar, Chalapathy Neti, Sankar Basu