Sciweavers

250 search results - page 32 / 50
» Modeling Public Key Infrastructures in the Real World
Sort
View
CVPR
2009
IEEE
16 years 4 months ago
Anomaly Detection in Extremely Crowded Scenes using Spatio-Temporal Motion Pattern Models
Extremely crowded scenes present unique challenges to video analysis that cannot be addressed with conventional approaches. We present a novel statistical framework for modeling...
Louis Kratz (Drexel University), Ko Nishino (Drexe...
WCE
2007
14 years 11 months ago
Constrained Path Optimisation for Underground Mine Layout
Abstract—The major infrastructure component required to develop an underground mine is a decline, which is a system of tunnels used for access and haulage. In this paper we study...
Marcus Brazil, P. A. Grossman, D. H. Lee, J. H. Ru...
KDD
2010
ACM
259views Data Mining» more  KDD 2010»
15 years 1 months ago
A probabilistic model for personalized tag prediction
Social tagging systems have become increasingly popular for sharing and organizing web resources. Tag recommendation is a common feature of social tagging systems. Social tagging ...
Dawei Yin, Zhenzhen Xue, Liangjie Hong, Brian D. D...
IFIPTM
2010
145views Management» more  IFIPTM 2010»
14 years 8 months ago
A Formal Notion of Trust - Enabling Reasoning about Security Properties
Historically, various different notions of trust can be found, each addressing particular aspects of ICT systems, e.g. trust in electronic commerce systems based on reputation and...
Andreas Fuchs, Sigrid Gürgens, Carsten Rudolp...
SAFECOMP
2007
Springer
15 years 3 months ago
Using Deductive Cause-Consequence Analysis (DCCA) with SCADE
Abstract. Esterel Technologies’ SCADE Suite is one of the most important development tools for software for safety-critical systems. It is used for designing many critical compon...
Matthias Güdemann, Frank Ortmeier, Wolfgang R...