Sciweavers

3381 search results - page 604 / 677
» Extending Dependencies with Conditions
Sort
View
88
Voted
JCS
2008
119views more  JCS 2008»
14 years 10 months ago
Synthesising verified access control systems through model checking
We present a framework for evaluating and generating access control policies. The framework contains a modelling formalism called RW, which is supported by a model checking tool. ...
Nan Zhang 0003, Mark Ryan, Dimitar P. Guelev
115
Voted
CVIU
2007
193views more  CVIU 2007»
14 years 10 months ago
Interpretation of complex scenes using dynamic tree-structure Bayesian networks
This paper addresses the problem of object detection and recognition in complex scenes, where objects are partially occluded. The approach presented herein is based on the hypothe...
Sinisa Todorovic, Michael C. Nechyba
JSAC
2008
118views more  JSAC 2008»
14 years 10 months ago
PEEC: a channel-adaptive feedback-based error
Reliable transmission is a challenging task over wireless LANs since wireless links are known to be susceptible to errors. Although the current IEEE802.11 standard ARQ error contro...
Sohraab Soltani, Hayder Radha
96
Voted
EAAI
2007
93views more  EAAI 2007»
14 years 10 months ago
Mining Pareto-optimal rules with respect to support and confirmation or support and anti-support
: In knowledge discovery and data mining many measures of interestingness have been proposed in order to measure the relevance and utility of the discovered patterns. Among these m...
Izabela Brzezinska, Salvatore Greco, Roman Slowins...
75
Voted
KI
2008
Springer
14 years 10 months ago
On Restaurants and Requirements: How Requirements Engineering may be Facilitated by Scripts
Requirements engineering is a central part of software projects. It is assumed that two third of all errors in software projects are caused by forgotten requirements or mutual misu...
Christoph Peylo