Sciweavers

1286 search results - page 115 / 258
» A Practical Modelling Notation for Secure Distributed Comput...
Sort
View
133
Voted
WEBI
2004
Springer
15 years 6 months ago
An Access Control Model for Web Services in Business Process
Business process describes a set of services that span enterprise boundaries and are provided by enterprises that see each other as partners. Web services is widely accepted and a...
Peng Liu, Zhong Chen
112
Voted
NECO
2002
145views more  NECO 2002»
15 years 13 days ago
Bayesian Model Assessment and Comparison Using Cross-Validation Predictive Densities
In this work, we discuss practical methods for the assessment, comparison, and selection of complex hierarchical Bayesian models. A natural way to assess the goodness of the model...
Aki Vehtari, Jouko Lampinen
93
Voted
NIPS
2000
15 years 2 months ago
High-temperature Expansions for Learning Models of Nonnegative Data
Recent work has exploited boundedness of data in the unsupervised learning of new types of generative model. For nonnegative data it was recently shown that the maximum-entropy ge...
Oliver B. Downs
86
Voted
TPDS
1998
95views more  TPDS 1998»
15 years 13 days ago
Bound Performance Models of Heterogeneous Parallel Processing Systems
- Systems of heterogeneous parallel processing are studied such as arising in parallel programs executed on distributed systems. A lower and an upper bound model are suggested to o...
Simonetta Balsamo, Lorenzo Donatiello, Nico M. van...
122
Voted
ICCV
2009
IEEE
16 years 5 months ago
Efficient Privacy Preserving Video Surveillance
Widespread use of surveillance cameras in offices and other business establishments, pose a significant threat to the privacy of the employees and visitors. The challenge of int...
Maneesh Upmanyu, Anoop M. Namboodiri, Kannan Srina...