Sciweavers

3972 search results - page 42 / 795
» Cosparse analysis modeling - uniqueness and algorithms
Sort
View
ICICS
2005
Springer
15 years 8 months ago
Network Vulnerability Analysis Through Vulnerability Take-Grant Model (VTG)
Modeling and analysis of information system vulnerabilities helps us to predict possible attacks to networks using the network configuration and vulnerabilities information. As a f...
Hamid Reza Shahriari, Reza Sadoddin, Rasool Jalili...
FGR
2006
IEEE
144views Biometrics» more  FGR 2006»
15 years 9 months ago
A Layered Deformable Model for Gait Analysis
In this paper, a layered deformable model (LDM) is proposed for human body pose recovery in gait analysis. This model is inspired by the manually labeled silhouettes in [6] and it...
Haiping Lu, Konstantinos N. Plataniotis, Anastasio...
EXPERT
2010
145views more  EXPERT 2010»
15 years 15 days ago
Interaction Analysis with a Bayesian Trajectory Model
Human behavior recognition is one of the most important and challenging objectives performed by intelligent vision systems. Several issues must be faced in this domain ranging fro...
Alessio Dore, Carlo S. Regazzoni
149
Voted
CIKM
2010
Springer
15 years 16 days ago
Modeling reformulation using passage analysis
Query reformulation modifies the original query with the aim of better matching the vocabulary of the relevant documents, and consequently improving ranking effectiveness. Previou...
Xiaobing Xue, W. Bruce Croft, David A. Smith
107
Voted
CAV
2007
Springer
110views Hardware» more  CAV 2007»
15 years 9 months ago
Hector: Software Model Checking with Cooperating Analysis Plugins
We present Hector, a software tool for combining different abstraction methods to extract sound models of heap-manipulating imperative programs with recursion. Extracted models ma...
Nathaniel Charlton, Michael Huth