Sciweavers

1816 search results - page 333 / 364
» ITS Domain Modelling with Ontology
Sort
View
ENTCS
2007
88views more  ENTCS 2007»
14 years 9 months ago
Keeping Secrets in Resource Aware Components
We present a powerful and flexible method for automatically checking the secrecy of values inside components. In our framework an attacker may monitor the external communication ...
Tom Chothia, Jun Pang, Muhammad Torabi Dashti
PAMI
2008
160views more  PAMI 2008»
14 years 9 months ago
Motion Segmentation and Depth Ordering Using an Occlusion Detector
We present a novel method for motion segmentation and depth ordering from a video sequence in general motion. We first compute motion segmentation based on differential properties ...
Doron Feldman, Daphna Weinshall
PRL
2008
246views more  PRL 2008»
14 years 9 months ago
Automatic medical image annotation in ImageCLEF 2007: Overview, results, and discussion
In this paper, the automatic medical annotation task of the 2007 CLEF cross-language image retrieval campaign (ImageCLEF) is described. The paper focusses on the images used, the ...
Thomas Deselaers, Thomas Martin Deserno, Henning M...
RTS
2006
106views more  RTS 2006»
14 years 9 months ago
Q-SCA: Incorporating QoS support into software communications architecture for SDR waveform processing
The Software Communications Architecture (SCA) defined by Joint Tactical Radio Systems (JTRS) is the de facto standard middleware currently adopted by the Software Defined Radio (...
Jaesoo Lee, Saehwa Kim, Jiyong Park, Seongsoo Hong
SYNTHESE
2008
84views more  SYNTHESE 2008»
14 years 9 months ago
How experimental algorithmics can benefit from Mayo's extensions to Neyman-Pearson theory of testing
Although theoretical results for several algorithms in many application domains were presented during the last decades, not all algorithms can be analyzed fully theoretically. Exp...
Thomas Bartz-Beielstein