Sciweavers

1529 search results - page 229 / 306
» Energy-Based Models of P Systems
Sort
View
ICSE
2003
IEEE-ACM
15 years 10 months ago
Pattern Oriented Software Development: Moving Seamlessly from Requirements to Architecture
Requirements Engineering (RE) deals with the early phases of software engineering namely requirement elicitation, modeling, specification and validation. Architecture of a softwar...
M. S. Rajasree, P. Jithendra Kumar Reddy, D. Janak...
CRV
2007
IEEE
232views Robotics» more  CRV 2007»
15 years 4 months ago
Automatic Annotation of Humans in Surveillance Video
In this paper we present a system for automatic annotation of humans passing a surveillance camera. Each human has 4 associated annotations: the primary color of the clothing, the...
D. M. Hansen, Bjarne K. Mortensen, P. T. Duizer, J...
PKC
2007
Springer
117views Cryptology» more  PKC 2007»
15 years 4 months ago
Identity-Based Traitor Tracing
We present the first identity-based traitor tracing scheme. The scheme is shown to be secure in the standard model, assuming the bilinear decision Diffie-Hellman (DBDH) is hard in...
Michel Abdalla, Alexander W. Dent, John Malone-Lee...
CSB
2005
IEEE
139views Bioinformatics» more  CSB 2005»
15 years 3 months ago
Using Parallel Algorithms for Searching Molecular Sequence Databases
This work presents the development of algorithms for approximate string matching using parallel methods. It intends to do the maximum of molecular sequences comparisons per unity ...
Carla Correa Tavares dos Reis, Rubem P. Mondaini
HICSS
2005
IEEE
134views Biometrics» more  HICSS 2005»
15 years 3 months ago
An Approach for Intent Identification by Building on Deception Detection
Past research in deception detection at the University of Arizona has guided the investigation of intent detection. A theoretical foundation and model for the analysis of intent d...
Judee K. Burgoon, Mark Adkins, John Kruse, Matthew...