Sciweavers

123 search results - page 8 / 25
» Modeling the Trust Boundaries Created by Securable Objects
Sort
View
DAGM
2010
Springer
15 years 25 days ago
Image Segmentation with a Statistical Appearance Model and a Generic Mumford-Shah Inspired Outside Model
Abstract. We present a novel statistical-model-based segmentation algorithm that addresses a recurrent problem in appearance model fitting and model-based segmentation: the "s...
Thomas Albrecht, Thomas Vetter
MICCAI
2002
Springer
16 years 18 days ago
Accurate and High Quality Triangle Models from 3D Grey Scale Images
Visualization of medical data requires the extraction of surfaces that represent the boundaries of objects of interest. This paper describes a method that combines finding these bo...
Paul W. de Bruin, P. M. van Meeteren, Frans Vos, A...
CHI
2002
ACM
16 years 2 days ago
What makes people trust online gambling sites?
A validated model of trust was used as a framework for an empirical study to identify on- and offline factors that influence gamblers' perception of an online casino's t...
Bhiru Shelat, Florian N. Egger
DBSEC
1996
125views Database» more  DBSEC 1996»
15 years 1 months ago
A Framework for High Assurance Security of Distributed Objects
High assurance security is di cult to achieve in distributed computer systems and databases because of their complexity, non-determinism and inherent heterogeneity. The practical ...
John Hale, Jody Threet, Sujeet Shenoi
CSE
2009
IEEE
15 years 6 months ago
A Hybrid Enforcement Model for Group-centric Secure Information Sharing
—Group-Centric Secure Information Sharing (g-SIS) is motivated by the need to dynamically share information amongst a set of authorized users for a specific purpose. Authorized ...
Ram Krishnan, Ravi S. Sandhu