Sciweavers

516 search results - page 92 / 104
» Compiling business process models for sensor networks
Sort
View
SUTC
2006
IEEE
15 years 10 months ago
The Computational Complexity of Enforceability Validation for Generic Access Control Rules
In computer security, many researches have tackled on the possibility of a unified model of access control, which could enforce any access control policies within a single unified...
Vincent C. Hu, D. Richard Kuhn, David F. Ferraiolo
AAAI
2011
14 years 4 months ago
Global Seismic Monitoring: A Bayesian Approach
The automated processing of multiple seismic signals to detect and localize seismic events is a central tool in both geophysics and nuclear treaty verification. This paper report...
Nimar S. Arora, Stuart Russell, Paul Kidwell, Erik...
RAS
2000
161views more  RAS 2000»
15 years 3 months ago
Active object recognition by view integration and reinforcement learning
A mobile agent with the task to classify its sensor pattern has to cope with ambiguous information. Active recognition of three-dimensional objects involves the observer in a sear...
Lucas Paletta, Axel Pinz
DOCENG
2008
ACM
15 years 5 months ago
Interactive office documents: a new face for web 2.0 applications
As the world wide web transforms from a vehicle of information dissemination and e-commerce transactions into a writable nexus of human collaboration, the Web 2.0 technologies at ...
John M. Boyer
TIP
2008
144views more  TIP 2008»
15 years 4 months ago
Incremental Refinement of Image Salient-Point Detection
Low-level image analysis systems typically detect "points of interest", i.e., areas of natural images that contain corners or edges. Most of the robust and computationall...
Yiannis Andreopoulos, Ioannis Patras