Sciweavers

9124 search results - page 1769 / 1825
» Requirements-Based Design Evaluation
Sort
View
CCS
2008
ACM
15 years 2 days ago
Towards an efficient and language-agnostic compliance checker for trust negotiation systems
To ensure that a trust negotiation succeeds whenever possible, authorization policy compliance checkers must be able to find all minimal sets of their owners' credentials tha...
Adam J. Lee, Marianne Winslett
CCS
2008
ACM
15 years 2 days ago
Authenticated hash tables
Hash tables are fundamental data structures that optimally answer membership queries. Suppose a client stores n elements in a hash table that is outsourced at a remote server so t...
Charalampos Papamanthou, Roberto Tamassia, Nikos T...
CCS
2008
ACM
15 years 2 days ago
Privacy oracle: a system for finding application leaks with black box differential testing
We describe the design and implementation of Privacy Oracle, a system that reports on application leaks of user information via the network traffic that they send. Privacy Oracle ...
Jaeyeon Jung, Anmol Sheth, Ben Greenstein, David W...
CHINZ
2008
ACM
15 years 2 days ago
Interactive visualisation techniques for dynamic speech transcription, correction and training
As performance gains in automatic speech recognition systems plateau, improvements to existing applications of speech recognition technology seem more likely to come from better u...
Saturnino Luz, Masood Masoodian, Bill Rogers
CIKM
2008
Springer
15 years 2 days ago
Active relevance feedback for difficult queries
Relevance feedback has been demonstrated to be an effective strategy for improving retrieval accuracy. The existing relevance feedback algorithms based on language models and vect...
Zuobing Xu, Ram Akella
« Prev « First page 1769 / 1825 Last » Next »