Sciweavers

977 search results - page 97 / 196
» Soft Constraints for Security
Sort
View
TSP
2010
14 years 8 months ago
MIMO cognitive radio: a game theoretical approach
Abstract--The concept of cognitive radio (CR) has recently received great attention from the research community as a promising paradigm to achieve efficient use of the frequency re...
Gesualdo Scutari, Daniel Pérez Palomar
EDOC
2011
IEEE
14 years 1 months ago
Resource and Agreement Management in Dynamic Crowdcomputing Environments
Abstract—Open Web-based and social platforms dramatically influence models of work. Today, there is an increasing interest in outsourcing tasks to crowdsourcing environments tha...
Harald Psaier, Florian Skopik, Daniel Schall, Scha...
EMNLP
2011
14 years 1 months ago
Cross-Cutting Models of Lexical Semantics
Context-dependent word similarity can be measured over multiple cross-cutting dimensions. For example, lung and breath are similar thematically, while authoritative and superfici...
Joseph Reisinger, Raymond J. Mooney
CVPR
2012
IEEE
13 years 4 months ago
Linear solution to scale invariant global figure ground separation
We propose a novel linear method for scale invariant figure ground separation in images and videos. Figure ground separation is treated as a superpixel labeling problem. We optim...
Hao Jiang
SACMAT
2009
ACM
15 years 8 months ago
Towards formal security analysis of GTRBAC using timed automata
An access control system is often viewed as a state transition system. Given a set of access control policies, a general safety requirement in such a system is to determine whethe...
Samrat Mondal, Shamik Sural, Vijayalakshmi Atluri