Sciweavers

7640 search results - page 156 / 1528
» Event Database Processing
Sort
View
119
Voted
CAISE
2010
Springer
15 years 3 months ago
Dynamic Authorisation Policies for Event-Based Task Delegation
Task delegation presents one of the business process security leitmotifs. It defines a mechanism that bridges the gap between both workflow and access control systems. There are tw...
Khaled Gaaloul, Ehtesham Zahoor, François C...
110
Voted
ICASSP
2011
IEEE
14 years 6 months ago
Jump Function Kolmogorov for overlapping audio event classification
This paper presents a novel method for audio event classi cation in overlapping conditions. The method is based on Jump Function Kolmogorov (JFK), a stochastic representation, whi...
Tran Huy Dat, Haizhou Li
117
Voted
VLDB
2001
ACM
114views Database» more  VLDB 2001»
15 years 7 months ago
Distinct Sampling for Highly-Accurate Answers to Distinct Values Queries and Event Reports
Estimating the number of distinct values is a wellstudied problem, due to its frequent occurrence in queries and its importance in selecting good query plans. Previous work has sh...
Phillip B. Gibbons
135
Voted
ICIP
2009
IEEE
16 years 3 months ago
Semantic Labeling Of Track Events Using Time Series Segmentation And Shape Analysis
This paper presents a novel framework for applying semantic labels to events within a track. A track is a two-dimensional (2D) or a three-dimensional (3D) signal in time where eac...
107
Voted
CISC
2005
Springer
116views Cryptology» more  CISC 2005»
15 years 8 months ago
Specifying Authentication Using Signal Events in CSP
The formal analysis of cryptographic protocols has developed into a comprehensive body of knowledge, building on a wide variety of formalisms and treating a diverse range of securi...
Siraj A. Shaikh, Vicky J. Bush, Steve A. Schneider