Sciweavers

5465 search results - page 340 / 1093
» Assigning Types to Processes
Sort
View
ESORICS
2000
Springer
15 years 8 months ago
Authentication and Confidentiality via IPSEC
The IP security protocols (IPsec) may be used via security gateways that apply cryptographic operations to provide security services to datagrams, and this mode of use is supported...
Joshua D. Guttman, Amy L. Herzog, F. Javier Thayer
BPM
2008
Springer
128views Business» more  BPM 2008»
15 years 6 months ago
Flexibility Schemes for Workflow Management Systems
Abstract. Currently, many hospitals are investigating the use of workflow management systems in order to provide support for healthcare processes. However, contemporary workflow ma...
R. S. Mans, Wil M. P. van der Aalst, Nick Russell,...
KBSE
2010
IEEE
15 years 2 months ago
Model comparison with GenericDiff
This paper proposes GenericDiff, a general framework for model comparison. The main idea is to separate the specification of domain-specific model properties and syntax from the g...
Zhenchang Xing
140
Voted
ICIP
2008
IEEE
16 years 6 months ago
A study on the effect of camera motion on human visual attention
The aim of this paper is to examine the effect of camera motion in user generated video with respect to human visual attention. Having a more accurate human attention model is par...
Golnaz Abdollahian, Zygmunt Pizlo, Edward J. Delp
141
Voted
ICIP
2007
IEEE
16 years 6 months ago
Complexity-Rate-Distortion Analysis of Backward Channel Aware Wyner-Ziv Video Coding
Many Wyner-Ziv video coding (WZVC) schemes encode a video sequence into two types of frames, key frames and Wyner-Ziv frames. We have previously presented a Wyner-Ziv video coding...
Limin Liu, Zhen Li, Edward J. Delp