In the real world, visual information is selected over time as well as space, when we prioritise new stimuli for attention. Watson and Humphreys [Visual marking: prioritising sele...
Eirini Mavritsaki, Dietmar Heinke, Glyn W. Humphre...
In recent years, the use of Intelligent Closed-Circuit Television (ICCTV) for crime prevention and detection has attracted significant attention. Existing face recognition system...
Ting Shan, Shaokang Chen, Conrad Sanderson, Brian ...
Current computer security systems are based on the premise that once a user presents valid credentials to the authentication system (e.g. valid ID and password), they are granted ...
In model-based control, a planner uses a system description to create a plan that achieves production goals. The same model can be used by model-based diagnosis to indirectly infe...
Lukas Kuhn, Bob Price, Minh Binh Do, Juan Liu, Ron...
In this paper, we study the maintenance of role-based access control (RBAC) models in database environments using transitive closure relations. In particular, the algorithms that ...