Sciweavers

2292 search results - page 418 / 459
» Structure preserving embedding
Sort
View
SP
2007
IEEE
137views Security Privacy» more  SP 2007»
15 years 5 months ago
A Cryptographic Decentralized Label Model
Information-flow security policies are an appealing way of specifying confidentiality and integrity policies in information systems. Most previous work on language-based securit...
Jeffrey A. Vaughan, Steve Zdancewic
CVPR
2007
IEEE
15 years 5 months ago
Estimating Cluster Overlap on Manifolds and its Application to Neuropsychiatric Disorders
Although it is usually assumed in many pattern recognition problems that different patterns are distinguishable, some patterns may have inseparable overlap. For example, some faci...
Peng Wang, Christian Köhler, Ragini Verma
CIKM
2007
Springer
15 years 5 months ago
Reusing relational sources for semantic information access
The rapid growth of available data arises the need for more sophisticated techniques for semantic access to information. It has been proved that using conceptual model or ontology...
Lina Lubyte
FC
2007
Springer
125views Cryptology» more  FC 2007»
15 years 5 months ago
Scalable Authenticated Tree Based Group Key Exchange for Ad-Hoc Groups
Task-specific groups are often formed in an ad-hoc manner within big structures, like companies. Take the following typical scenario: A high rank manager decides that a task force...
Yvo Desmedt, Tanja Lange, Mike Burmester
GECCO
2007
Springer
197views Optimization» more  GECCO 2007»
15 years 5 months ago
Computational intelligence techniques: a study of scleroderma skin disease
This paper presents an analysis of microarray gene expression data from patients with and without scleroderma skin disease using computational intelligence and visual data mining ...
Julio J. Valdés, Alan J. Barton