Sciweavers

2072 search results - page 146 / 415
» Applications of Independent Component Analysis
Sort
View
78
Voted
BMVC
2001
15 years 3 months ago
A Case Study in the use of ROC curves for Algorithm Design
We describe the development of a vision system to detect natural events in a low-resolution image stream. The work involves the assessment of algorithmic design decisions to maxim...
Paul A. Bromiley, Patrick Courtney, Neil A. Thacke...
CSFW
1994
IEEE
15 years 4 months ago
One-Representative Safety Analysis in the Non-Monotonic Transform Model
We analyze the safety question for the Non-Monotonic Transform NMT model, an access control model that encompasses a wide variety of practical access control mechanisms. In genera...
Ravi S. Sandhu, Paul Ammann
106
Voted
CAL
2006
15 years 23 days ago
Performance modeling using Monte Carlo simulation
Abstract-- Cycle accurate simulation has long been the primary tool for micro-architecture design and evaluation. Though accurate, the slow speed often imposes constraints on the e...
Ram Srinivasan, Jeanine Cook, Olaf M. Lubeck
116
Voted
BPSC
2010
139views Business» more  BPSC 2010»
14 years 10 months ago
Static Information Flow Analysis of Workflow Models
: This paper proposes a framework for the detection of information leaks in workflow descriptions based on static information flow analysis. Despite the correct deployment of acces...
Rafael Accorsi, Claus Wonnemann
89
Voted
ISI
2005
Springer
15 years 6 months ago
Data Distortion for Privacy Protection in a Terrorist Analysis System
Data distortion is a critical component to preserve privacy in security-related data mining applications, such as in data miningbased terrorist analysis systems. We propose a spars...
Shuting Xu, Jun Zhang, Dianwei Han, Jie Wang