Sciweavers

1414 search results - page 219 / 283
» Combining Intruder Theories
Sort
View
SIGIR
2002
ACM
14 years 9 months ago
Video retrieval using an MPEG-7 based inference network
This work proposes a model for video retrieval based upon the inference network model. The document network is constructed using video metadata encoded using MPEG-7 and captures i...
Andrew Graves, Mounia Lalmas
PE
2007
Springer
112views Optimization» more  PE 2007»
14 years 9 months ago
Multicast inference of temporal loss characteristics
Multicast-based inference has been proposed as a method of estimating average loss rates of internal network links, using end-to-end loss measurements of probes sent over a multic...
Vijay Arya, Nick G. Duffield, Darryl Veitch
PAMI
2008
161views more  PAMI 2008»
14 years 9 months ago
Multilayered 3D LiDAR Image Construction Using Spatial Models in a Bayesian Framework
Standard 3D imaging systems process only a single return at each pixel from an assumed single opaque surface. However, there are situations when the laser return consists of multip...
Sergio Hernandez-Marin, Andrew M. Wallace, Gavin J...
ICST
2010
IEEE
14 years 8 months ago
When BDDs Fail: Conformance Testing with Symbolic Execution and SMT Solving
—Model-based testing is a well known technique that allows one to validate the correctness of software with respect to its model. If a lot of data is involved, symbolic technique...
Elisabeth Jöbstl, Martin Weiglhofer, Bernhard...
IFIPTM
2010
140views Management» more  IFIPTM 2010»
14 years 8 months ago
Shinren: Non-monotonic Trust Management for Distributed Systems
Abstract. The open and dynamic nature of modern distributed systems and pervasive environments presents significant challenges to security management. One solution may be trust ma...
Changyu Dong, Naranker Dulay