Sciweavers

2655 search results - page 150 / 531
» Event Systems and Access Control
Sort
View
AVSS
2008
IEEE
15 years 11 months ago
Automatic Detection of Adverse Weather Conditions in Traffic Scenes
Visual surveillance in outdoor environments requires the monitoring of both objects and events. The analysis is generally driven by the target application which, in turn, determin...
Andrea Lagorio, Enrico Grosso, Massimo Tistarelli
SACMAT
2005
ACM
15 years 10 months ago
Composing and combining policies under the policy machine
As a major component of any host, or network operating system, access control mechanisms come in a wide variety of forms, each with their individual attributes, functions, methods...
David F. Ferraiolo, Serban I. Gavrila, Vincent C. ...
CCS
2010
ACM
15 years 2 days ago
SecTag: a multi-policy supported secure web tag framework
Traditional web application development often encounters tight coupling problem between access control logic and business logic. It is hard to configure and modify access control ...
Ruixuan Li, Meng Dong, Bin Liu, Jianfeng Lu, Xiaop...
BMCBI
2010
112views more  BMCBI 2010»
15 years 5 months ago
A parameter-adaptive dynamic programming approach for inferring cophylogenies
Background: Coevolutionary systems like hosts and their parasites are commonly used model systems for evolutionary studies. Inferring the coevolutionary history based on given phy...
Daniel Merkle, Martin Middendorf, Nicolas Wieseke
122
Voted
COLING
2000
15 years 6 months ago
The Week at a Glance - Cross-language Cross-document Information Extraction and Translation
Work on the production of texts in English describing instances of a particular event type from multiple news sources will be described. A system has been developed which extracts...
James R. Cowie, Yevgeny Ludovik, Hugo Molina-Salga...