Sciweavers

2740 search results - page 212 / 548
» A Model-Based Approach To Requirements Analysis
Sort
View
180
Voted

Publication
200views
13 years 11 months ago
Learning Tags from Unsegmented Videos of Multiple Human Actions
Providing methods to support semantic interaction with growing volumes of video data is an increasingly important challenge for data mining. To this end, there has been some succes...
Timothy Hospedales, Shaogang Gong, Tao Xiang
WISA
2005
Springer
15 years 9 months ago
DPA Attack on the Improved Ha-Moon Algorithm
Abstract. The algorithm proposed by Ha and Moon [2] is a countermeasure against power analysis. The Ha-Moon algorithm has two drawbacks in that it requires an inversion and has a r...
Jong Hoon Shin, Dong Jin Park, Pil Joong Lee
134
Voted
IFIP
2009
Springer
15 years 1 months ago
Model Checking of Security-Sensitive Business Processes
Security-sensitive business processes are business processes that must comply with security requirements (e.g. authorization constraints). In previous works it has been shown that ...
Alessandro Armando, Serena Elisa Ponta
123
Voted
CMSB
2009
Springer
15 years 10 months ago
Approximation of Event Probabilities in Noisy Cellular Processes
Molecular noise, which arises from the randomness of the discrete events in the cell, significantly influences fundamental biological processes. Discrete-state continuous-time st...
Frédéric Didier, Thomas A. Henzinger...
146
Voted
AVSS
2008
IEEE
15 years 10 months ago
Automatic Detection of Adverse Weather Conditions in Traffic Scenes
Visual surveillance in outdoor environments requires the monitoring of both objects and events. The analysis is generally driven by the target application which, in turn, determin...
Andrea Lagorio, Enrico Grosso, Massimo Tistarelli