Sciweavers

635 search results - page 77 / 127
» Bridging the Gaps between Cameras
Sort
View
HICSS
2009
IEEE
151views Biometrics» more  HICSS 2009»
15 years 6 months ago
Integrating Formal Analysis and Design to Preserve Security Properties
The use of formal methods has long been advocated in the development of secure systems. Yet, methods for deriving design from requirements that guarantee retention of the intended...
Riham Hassan, Shawn A. Bohner, Sherif El-Kassas, M...
IEEESCC
2009
IEEE
15 years 6 months ago
Context Aware Middleware Architecture for Wireless Sensor Network
Wireless sensor networks are application specific, data centric networks where different applications run on deployed network. Each application interprets the underlying sensor n...
Pankesh Patel, Sunil Jardosh, Sanjay Chaudhary, Pr...
WEBI
2009
Springer
15 years 6 months ago
CCR: A Model for Sharing Reputation Knowledge Across Virtual Communities
Information sharing is a key objective in the age of Internet and virtual communities. Reputation information is an important part of a user’s identity and is both a sensitive a...
Tal Grinshpoun, Nurit Gal-Oz, Amnon Meisels, Ehud ...
ISMIS
2009
Springer
15 years 6 months ago
Discovering Structured Event Logs from Unstructured Audit Trails for Workflow Mining
Workflow mining aims to find graph-based process models based on activities, emails, and various event logs recorded in computer systems. Current workflow mining techniques mainly ...
Liqiang Geng, Scott Buffett, Bruce Hamilton, Xin W...
MM
2009
ACM
199views Multimedia» more  MM 2009»
15 years 6 months ago
Signature quadratic form distances for content-based similarity
Determining similarity is a fundamental task in querying multimedia databases in a content-based way. For this challenging task, there exist numerous similarity models which measu...
Christian Beecks, Merih Seran Uysal, Thomas Seidl