Sciweavers

4142 search results - page 749 / 829
» Trusting an Information Agent
Sort
View
CNSM
2010
14 years 10 months ago
CRAC: Confidentiality risk assessment and IT-infrastructure comparison
Confidentiality is a critical aspect in todays Risk Assessment (RA) practices for many industrial organizations. Assessing confidentiality risks is challenging and the result of a ...
Ayse Morali, Emmanuele Zambon, Sandro Etalle, Roel...
ICASSP
2010
IEEE
14 years 10 months ago
Restoration-based iron oxide particles quantification in MR images
Magnetic Resonance Imaging (MRI) is a medical imaging modality that provides structural and functional information. To improve the contrast of MR images, contrast agents, such as ...
Delphine Charpigny, Thomas Grenier, Christophe Ode...
ICASSP
2011
IEEE
14 years 3 months ago
Extracting call-reason segments from contact center dialogs by using automatically acquired boundary expressions
To improve the performance of call-reason analysis at contact centers, we introduce a novel method to extract call-reason segments from dialogs. It is based on the following two c...
Takaaki Fukutomi, Satoshi Kobashikawa, Taichi Asam...
CIKM
2005
Springer
15 years 5 months ago
A function-based access control model for XML databases
XML documents are frequently used in applications such as business transactions and medical records involving sensitive information. Typically, parts of documents should be visibl...
Naizhen Qi, Michiharu Kudo, Jussi Myllymaki, Hamid...
ATAL
2009
Springer
15 years 6 months ago
Caching schemes for DCOP search algorithms
Distributed Constraint Optimization (DCOP) is useful for solving agent-coordination problems. Any-space DCOP search algorithms require only a small amount of memory but can be spe...
William Yeoh, Pradeep Varakantham, Sven Koenig