Sciweavers

2740 search results - page 449 / 548
» A Model-Based Approach To Requirements Analysis
Sort
View
EUROPKI
2005
Springer
15 years 3 months ago
Legal Security for Transformations of Signed Documents: Fundamental Concepts
Abstract. Transformations of signed documents raise questions of technical and organisational nature which render the legal security of the transformed document doubtful. In partic...
Andreas U. Schmidt, Zbynek Loebl
GECCO
2005
Springer
133views Optimization» more  GECCO 2005»
15 years 3 months ago
Tactical UGV navigation and logistics planning
The Army’s push towards developing highly flexible military teams that combine manned and unmanned units requires significant advances in the intelligence of the unmanned units ...
Talib S. Hussain, Daniel Cerys, David J. Montana, ...
ICMI
2005
Springer
170views Biometrics» more  ICMI 2005»
15 years 3 months ago
Inferring body pose using speech content
Untethered multimodal interfaces are more attractive than tethered ones because they are more natural and expressive for interaction. Such interfaces usually require robust vision...
Sy Bor Wang, David Demirdjian
ISMIS
2005
Springer
15 years 3 months ago
Statistical Database Modeling for Privacy Preserving Database Generation
Abstract. Testing of database applications is of great importance. Although various studies have been conducted to investigate testing techniques for database design, relatively fe...
Xintao Wu, Yongge Wang, Yuliang Zheng
KES
2005
Springer
15 years 3 months ago
Design of a Digital Forensics Image Mining System
Increasing amount of illicit image data transmitted via the internet has triggered the need to develop effective image mining systems for digital forensics purposes. This paper dis...
Ross Brown, Binh Pham, Olivier Y. de Vel