Sciweavers

1011 search results - page 174 / 203
» Numerical Constraints for XML
Sort
View
CISC
2009
Springer
148views Cryptology» more  CISC 2009»
14 years 10 months ago
Using Strategy Objectives for Network Security Analysis
The anticipation game framework is an extension of attack graphs based on game theory. It is used to anticipate and analyze intruder and administrator concurrent interactions with ...
Elie Bursztein, John C. Mitchell
DMIN
2009
142views Data Mining» more  DMIN 2009»
14 years 10 months ago
Action Selection in Customer Value Optimization: An Approach Based on Covariate-Dependent Markov Decision Processes
Typical methods in CRM marketing include action selection on the basis of Markov Decision Processes with fixed transition probabilities on the one hand, and scoring customers separ...
Angi Roesch, Harald Schmidbauer
ICCV
2009
IEEE
14 years 10 months ago
Face alignment through subspace constrained mean-shifts
Deformable model fitting has been actively pursued in the computer vision community for over a decade. As a result, numerous approaches have been proposed with varying degrees of ...
Jason M. Saragih, Simon Lucey, Jeffrey F. Cohn
132
Voted
ICIP
2009
IEEE
14 years 10 months ago
Total variation projection with first order schemes
This article proposes a new algorithm to compute the projection on the set of images whose total variation is bounded by a constant. The projection is computed through a dual form...
Mohamed-Jalal Fadili, Gabriel Peyré
99
Voted
IFIPTM
2009
163views Management» more  IFIPTM 2009»
14 years 10 months ago
TrustBuilder2: A Reconfigurable Framework for Trust Negotiation
To date, research in trust negotiation has focused mainly on the theoretical aspects of the trust negotiation process, and the development of proof of concept implementations. Thes...
Adam J. Lee, Marianne Winslett, Kenneth J. Perano