Sciweavers

516 search results - page 70 / 104
» Comparing Two Information Flow Security Properties
Sort
View
112
Voted
ICPR
2006
IEEE
16 years 4 months ago
Vehicle Lateral Position Estimation Method Based on Matching of Top-View Images
In this paper, a method to estimate the lateral position of the vehicle from a sequence of moving camera images is proposed. Proposed method relies on the plane projective transfo...
Tomoaki Teshima, Hideo Saito, Shinji Ozawa, Keiich...
122
Voted
CN
2004
108views more  CN 2004»
15 years 3 months ago
Routing bandwidth-guaranteed paths with restoration in label-switched networks
Label switched networks have become increasingly attractive to both network providers and customers. By creating aggregate, bandwidth-reserved flows, these networks offer routing ...
Samphel Norden, Milind M. Buddhikot, Marcel Waldvo...
127
Voted
CSFW
2006
IEEE
15 years 9 months ago
Privacy APIs: Access Control Techniques to Analyze and Verify Legal Privacy Policies
There is a growing interest in establishing rules to regulate the privacy of citizens in the treatment of sensitive personal data such as medical and financial records. Such rule...
Michael J. May, Carl A. Gunter, Insup Lee
129
Voted
ICCBR
2009
Springer
15 years 1 months ago
On Similarity Measures Based on a Refinement Lattice
Abstract. Retrieval of structured cases using similarity has been studied in CBR but there has been less activity on defining similarity on description logics (DL). In this paper w...
Santiago Ontañón, Enric Plaza
108
Voted
IMC
2004
ACM
15 years 9 months ago
Measurement based characterization and provisioning of IP VPNs
Virtual Private Networks provide secure and reliable communication between customer sites. With increase in number and size of VPNs, providers need efficient provisioning techniqu...
Satish Raghunath, K. K. Ramakrishnan, Shivkumar Ka...