Sciweavers

2072 search results - page 146 / 415
» Applications of Independent Component Analysis
Sort
View
66
Voted
BMVC
2001
15 years 18 days ago
A Case Study in the use of ROC curves for Algorithm Design
We describe the development of a vision system to detect natural events in a low-resolution image stream. The work involves the assessment of algorithmic design decisions to maxim...
Paul A. Bromiley, Patrick Courtney, Neil A. Thacke...
75
Voted
CSFW
1994
IEEE
15 years 2 months ago
One-Representative Safety Analysis in the Non-Monotonic Transform Model
We analyze the safety question for the Non-Monotonic Transform NMT model, an access control model that encompasses a wide variety of practical access control mechanisms. In genera...
Ravi S. Sandhu, Paul Ammann
84
Voted
CAL
2006
14 years 10 months ago
Performance modeling using Monte Carlo simulation
Abstract-- Cycle accurate simulation has long been the primary tool for micro-architecture design and evaluation. Though accurate, the slow speed often imposes constraints on the e...
Ram Srinivasan, Jeanine Cook, Olaf M. Lubeck
BPSC
2010
139views Business» more  BPSC 2010»
14 years 8 months ago
Static Information Flow Analysis of Workflow Models
: This paper proposes a framework for the detection of information leaks in workflow descriptions based on static information flow analysis. Despite the correct deployment of acces...
Rafael Accorsi, Claus Wonnemann
ISI
2005
Springer
15 years 3 months ago
Data Distortion for Privacy Protection in a Terrorist Analysis System
Data distortion is a critical component to preserve privacy in security-related data mining applications, such as in data miningbased terrorist analysis systems. We propose a spars...
Shuting Xu, Jun Zhang, Dianwei Han, Jie Wang