Sciweavers

1730 search results - page 235 / 346
» Computer Aided Design Modeling for Heterogeneous Objects
Sort
View
FASE
2008
Springer
14 years 11 months ago
Automated Analysis of Permission-Based Security Using UMLsec
Abstract. To guarantee the security of computer systems, it is necessary to define security permissions to restrict the access to the systems' resources. These permissions enf...
Jan Jürjens, Jörg Schreck, Yijun Yu
SAC
2003
ACM
15 years 3 months ago
UbiData: Ubiquitous Mobile File Service
One of the most challenging objectives of mobile data management is the ubiquitous, any time, anywhere access. This objective is very difficult to meet due to several network and ...
Jinsuo Zhang, Abdelsalam Helal, Joachim Hammer
ICPR
2004
IEEE
15 years 11 months ago
An Efficient Automatic Redeye Detection and Correction Algorithm
A fully automatic redeye detection and correction algorithm is presented to address the redeye artifacts in digital photos. The algorithm contains a redeye detection part and a co...
Dan Tretter, Huitao Luo, Jonathan Yen
ICPR
2010
IEEE
15 years 3 months ago
Discriminative Level Set for Contour Tracking
Conventional contour tracking algorithms with level set often use generative models to construct the energy function. For tracking through cluttered and noisy background, however,...
Wei Li
ATAL
2010
Springer
14 years 11 months ago
Optimal social laws
Social laws have proved to be a powerful and theoretically elegant framework for coordination in multi-agent systems. Most existing models of social laws assume that a designer is...
Thomas Ågotnes, Michael Wooldridge