Sciweavers

947 search results - page 114 / 190
» HMM-Based Trust Model
Sort
View
SP
1996
IEEE
140views Security Privacy» more  SP 1996»
15 years 4 months ago
A Security Model of Dynamic Labeling Providing a Tiered Approach to Verification
In the proposed mandatory access control model, arbitrary label changing policies can be expressed. The relatively simple model can capture a wide variety of security policies, in...
Simon N. Foley, Li Gong, Xiaolei Qian
93
Voted
ERCIMDL
2008
Springer
122views Education» more  ERCIMDL 2008»
15 years 2 months ago
Improving Temporal Language Models for Determining Time of Non-timestamped Documents
Taking the temporal dimension into account in searching, i.e., using time of content creation as part of the search condition, is now gaining increasingly interest. However, in the...
Nattiya Kanhabua, Kjetil Nørvåg
SIS
2008
15 years 2 months ago
An Access Control Model for Location based Services
In this paper we propose an access control model for use by a trusted middleware infrastructure, which is part of an architecture that supports the operation of Location Based Serv...
Cameron Ross Dunne, Thibault Candebat, David Gray
98
Voted
ICPR
2004
IEEE
16 years 1 months ago
Evaluation of Model-Based Interactive Flower Recognition
We introduce the concept of Computer Assisted Visual InterActive Recognition (CAVIAR). In CAVIAR, a parameterized geometrical model serves as the human-computer communication chan...
Jie Zou, George Nagy
DIGRA
2005
Springer
15 years 6 months ago
Extending Soft Models to Game Design: Flow, Challenges and Conflicts
Challenge and conflict are elements that all game designers strive to engineer into their games. Research shows that challenge is what drives a high proportion of games players ye...
Abdennour El Rhalibi, Martin Hanneghan, Stephen Ta...