Sciweavers

2050 search results - page 219 / 410
» constraints 2010
Sort
View
79
Voted
IEEESP
2010
82views more  IEEESP 2010»
14 years 11 months ago
Scenario-Driven Role Engineering
Role engineering for role-based access control (RBAC) is a process to define roles, permissions, constraints, and role hierarchies. The scenario-driven role engineering process pr...
Mark Strembeck
81
Voted
IJCV
2010
135views more  IJCV 2010»
14 years 11 months ago
On the Apparent Transparency of a Motion Blurred Object
An object which moves during the exposure time results in a blurred smear in the image. We consider the smear as if it was the image of a semitransparent object, and we retrieve i...
Vincenzo Caglioti, Alessandro Giusti
119
Voted
IJSNET
2010
103views more  IJSNET 2010»
14 years 11 months ago
Quality-aware sensor data collection
: Many sensor applications often require to collect raw sensed values from many sensor nodes to one centralized server. Sensor data collection typically comes with various quality ...
Qi Han, Doug Hakkarinen, Pruet Boonma, Junichi Suz...
118
Voted
INCDM
2010
Springer
138views Data Mining» more  INCDM 2010»
14 years 11 months ago
Learning Discriminative Distance Functions for Case Retrieval and Decision Support
The importance of learning distance functions is gradually being acknowledged by the machine learning community, and different techniques are suggested that can successfully learn ...
Alexey Tsymbal, Martin Huber, Shaohua Kevin Zhou
118
Voted
INFOCOM
2010
IEEE
14 years 11 months ago
Towards a Theory of Anonymous Networking
The problem of anonymous networking when an eavesdropper observes packet timings in a communication network is considered. The goal is to hide the identities of source-destination...
Javad Ghaderi, Rayadurgam Srikant