Sciweavers

5109 search results - page 783 / 1022
» On Learning Limiting Programs
Sort
View
124
Voted
ACSAC
2006
IEEE
15 years 10 months ago
A Study of Access Control Requirements for Healthcare Systems Based on Audit Trails from Access Logs
In healthcare, role-based access control systems are often extended with exception mechanisms to ensure access to needed informationeven when the needs don’t followthe expected ...
Lillian Røstad, Ole Edsberg
AVSS
2006
IEEE
15 years 10 months ago
Activity Topology Estimation for Large Networks of Cameras
Estimating the paths that moving objects can take through the fields of view of possibly non-overlapping cameras, also known as their activity topology, is an important step in t...
Anton van den Hengel, Anthony R. Dick, Rhys Hill
CIBCB
2006
IEEE
15 years 10 months ago
A Systematic Computational Approach for Transcription Factor Target Gene Prediction
— Computational prediction of transcription factor’s binding sites and regulatory target genes has great value to the biological studies of cellular process. Existing practices...
Ji He, Xinbin Dai, Xuechun Zhao
IAT
2006
IEEE
15 years 10 months ago
Crime Pattern Detection Using Data Mining
Data mining can be used to model crime detection problems. Crimes are a social nuisance and cost our society dearly in several ways. Any research that can help in solving crimes f...
Shyam Varan Nath
151
Voted
ICMCS
2006
IEEE
136views Multimedia» more  ICMCS 2006»
15 years 10 months ago
PASS: Peer-Aware Silence Suppression for Internet Voice Conferences
A novel tandem-free solution for multiparty VoIP conferences called PASS (Peer-Aware Silence Suppression) is presented. Similar to traditional tandem-free solutions, PASS introduc...
Xun Xu, Li-wei He, Dinei A. F. Florêncio, Yo...