Sciweavers

1611 search results - page 166 / 323
» An Access Control Model for Video Database Systems
Sort
View
150
Voted
CODASPY
2012
13 years 11 months ago
Identifying native applications with high assurance
Main stream operating system kernels lack a strong and reliable mechanism for identifying the running processes and binding them to the corresponding executable applications. In t...
Hussain M. J. Almohri, Danfeng (Daphne) Yao, Denni...
141
Voted
ICASSP
2008
IEEE
15 years 10 months ago
Audiovisual-to-articulatory speech inversion using Active Appearance Models for the face and Hidden Markov Models for the dynami
We are interested in recovering aspects of vocal tract’s geometry and dynamics from auditory and visual speech cues. We approach the problem in a statistical framework based on ...
Athanassios Katsamanis, George Papandreou, Petros ...
ENTCS
2007
101views more  ENTCS 2007»
15 years 3 months ago
Systems Modelling via Resources and Processes: Philosophy, Calculus, Semantics, and Logic
We describe a programme of research in resource semantics, concurrency theory, bunched logic, and stochastic processes, as applied to mathematical systems modelling. Motivated by ...
David J. Pym, Chris M. N. Tofts
COMPSAC
2007
IEEE
15 years 9 months ago
An Adaptive Security Model for Multi-agent Systems and Application to a Clinical Trials Environment
We present in this paper an adaptive security model for Multi-agent systems. A security meta-model has been developed in which the traditional role concept has been extended. The ...
Liang Xiao 0002, Andrew Peet, Paul H. Lewis, Srina...
186
Voted
ITIIS
2010
343views more  ITIIS 2010»
14 years 10 months ago
Dynamic Manipulation of a Virtual Object in Marker-less AR system Based on Both Human Hands
This paper presents a novel approach to control the augmented reality (AR) objects robustly in a marker-less AR system by fingertip tracking and hand pattern recognition. It is kn...
Junchul Chun, Byungsung Lee