Sciweavers

956 search results - page 104 / 192
» Multiple Views on System Traces
Sort
View
ENTCS
2008
75views more  ENTCS 2008»
14 years 10 months ago
On the Refinement of Atomic Actions
Inspired by the properties of the refinement development of the Mondex Electronic Purse, we view an atomic action as a family of transitions with a common before-state, and differ...
Richard Banach, Gerhard Schellhorn
100
Voted
IJCV
2000
180views more  IJCV 2000»
14 years 10 months ago
Probabilistic Models of Appearance for 3-D Object Recognition
We describe how to model the appearance of a 3-D object using multiple views, learn such a model from training images, and use the model for object recognition. The model uses pro...
Arthur R. Pope, David G. Lowe
HT
1993
ACM
15 years 2 months ago
Concurrency Control in Collaborative Hypertext Systems
Traditional concurrency control techniques for database systems (transaction management based on locking protocols) have been successful in many multiuser settings, but these tech...
Uffe Kock Wiil, John J. Leggett
ICIP
2005
IEEE
15 years 11 months ago
Risk minimization in traitors within traitors in multimedia forensics
In digital fingerprinting and multimedia forensic systems, it is possible that multiple adversaries mount attacks collectively and effectively to undermine the forensic system...
H. Vicky Zhao, K. J. Ray Liu
ESORICS
2009
Springer
15 years 10 months ago
Automatically Generating Models for Botnet Detection
A botnet is a network of compromised hosts that is under the control of a single, malicious entity, often called the botmaster. We present a system that aims to detect bots, indepe...
Peter Wurzinger, Leyla Bilge, Thorsten Holz, Jan G...