Sciweavers

1336 search results - page 66 / 268
» Modelling and Analysis of PKI-Based Systems Using Process Ca...
Sort
View
ECMDAFA
2006
Springer
228views Hardware» more  ECMDAFA 2006»
15 years 7 months ago
Model Driven Development of Multi-Agent Systems
Abstract. Design patterns are templates of general solutions to commonlyoccurring problems in the analysis and design of software systems. In mature development processes, engineer...
Juan Pavón, Jorge J. Gómez-Sanz, Rub...
136
Voted
ICASSP
2011
IEEE
14 years 7 months ago
Forensically inspired approaches to automatic speaker recognition
This paper presents ongoing research leveraging forensic methods for automatic speaker recognition. Some of the methods forensic scientists employ include identifying speaker dist...
Kyu J. Han, Mohamed Kamal Omar, Jason W. Pelecanos...
146
Voted
ICIP
2001
IEEE
16 years 5 months ago
Use of a probabilistic shape model for non-linear registration of 3D scattered data
In this paper we address the problem of registering 3D scattered data by the mean of a statistical shape model. This model is built from a training set on which a principal compon...
Isabelle Corouge, Christian Barillot
134
Voted
VLDB
1990
ACM
77views Database» more  VLDB 1990»
15 years 7 months ago
Efficient Main Memory Data Management Using the DBGraph Storage Model
Therequirementsfor amain memorydatastoragemodel are both compactnessand efficient processing for all database operations. The DBGraph storage model, proposed in this paper, achiev...
Philippe Pucheral, Jean-Marc Thévenin, Patr...
CCS
2010
ACM
15 years 3 months ago
AccessMiner: using system-centric models for malware protection
Models based on system calls are a popular and common approach to characterize the run-time behavior of programs. For example, system calls are used by intrusion detection systems...
Andrea Lanzi, Davide Balzarotti, Christopher Krueg...