Sciweavers

1611 search results - page 170 / 323
» An Access Control Model for Video Database Systems
Sort
View
SACMAT
2010
ACM
14 years 8 months ago
Role mining based on weights
Role mining from the existing permissions has been widely applied to aid the process of migrating to an RBAC system. While all permissions are treated evenly in previous approache...
Xiaopu Ma, Ruixuan Li, Zhengding Lu
ICIP
2008
IEEE
15 years 11 months ago
Managing privacy data in pervasive camera networks
Privacy protection of visual information is increasingly important as pervasive camera networks becomes more prevalent. The proposed scheme addresses the problem of preserving and...
Sen-Ching S. Cheung, Jithendra K. Paruchuri, Thinh...
ICIP
2002
IEEE
15 years 3 months ago
Panoramic capturing and recognition of human activity
This paper presents a unified approach to human activity capturing and recognition. It targets applications such as a speaker walking, turning around, sitting and getting up from ...
Xinding Sun, B. S. Manjunath
CN
2000
76views more  CN 2000»
14 years 10 months ago
Supporting reconfigurable security policies for mobile programs
Programming models that support code migration have gained prominence, mainly due to a widespread shift from stand-alone to distributed applications. Although appealing in terms o...
Brant Hashii, Scott Malabarba, Raju Pandey, Matt B...
ICIP
2003
IEEE
15 years 3 months ago
Stochastic rate-control of interframe video coders for VBR channels
We propose a new algorithm for the real-time control of an interframe video coder operating with a variable rate channel such as wireless channels or the Internet. Using technique...
Julián Cabrera, José Ignacio Ronda, ...