Sciweavers

945 search results - page 70 / 189
» Detective Information Flow Analysis for Business Processes
Sort
View
BTW
2007
Springer
119views Database» more  BTW 2007»
15 years 8 months ago
Change Management in Large Information Infrastructures - Representing and Analyzing Arbitrary Metadata
Abstract: With information infrastructures getting more and more complex, it becomes necessary to give automated support for managing the evolution of the infrastructure. If change...
Boris Stumm, Stefan Dessloch
118
Voted
CHI
2011
ACM
14 years 5 months ago
Feedlack detects missing feedback in web applications
While usability methods such as user studies and inspections can reveal a wide range of problems, they do so for only a subset of an application’s features and states. We presen...
Andrew J. Ko, Xing Zhang
DBSEC
2006
115views Database» more  DBSEC 2006»
15 years 3 months ago
Creating Objects in the Flexible Authorization Framework
Access control is a crucial concern to build secure IT systems and, more specifically, to protect the confidentiality of information. However, access control is necessary, but not ...
Nicola Zannone, Sushil Jajodia, Duminda Wijesekera
CVPR
2005
IEEE
15 years 3 months ago
Fast Illumination-Invariant Background Subtraction Using Two Views: Error Analysis, Sensor Placement and Applications
Background modeling and subtraction to detect new or moving objects in a scene is an important component of many intelligent video applications. Compared to a single camera, the u...
Ser-Nam Lim, Anurag Mittal, Larry S. Davis, Nikos ...
121
Voted
ICIAP
2007
ACM
15 years 8 months ago
Image Spam Filtering Using Visual Information
We address the problem of recognizing the so-called image spam, which consists in embedding the spam message into attached images to defeat techniques based on the analysis of e-m...
Battista Biggio, Giorgio Fumera, Ignazio Pillai, F...