Sciweavers

2468 search results - page 293 / 494
» On Model Checking Techniques for Randomized Distributed Syst...
Sort
View
EDBT
2006
ACM
177views Database» more  EDBT 2006»
16 years 4 months ago
Authorization-Transparent Access Control for XML Under the Non-Truman Model
In authorization-transparent access control, users formulate their queries against the database schema rather than against authorization views that transform and hide data. The Tru...
Alberto O. Mendelzon, Renée J. Miller, Yaro...
ICMCS
2007
IEEE
124views Multimedia» more  ICMCS 2007»
15 years 10 months ago
Robust Video Object Segmentation Based on K-Means Background Clustering and Watershed in Ill-Conditioned Surveillance Systems
A robust video object segmentation algorithm for complex conditions in surveillance systems is proposed in this paper. This algorithm contains an unsupervised K-Means background c...
Tse-Wei Chen, Shou-Chieh Hsu, Shao-Yi Chien
TIT
2010
150views Education» more  TIT 2010»
14 years 10 months ago
Information-theoretic key agreement of multiple terminals: part I
This is the first part of a two-part paper on information-theoretically secure secret key agreement. In this part, we study the secrecy problem under the widely studied source mod...
Amin Aminzadeh Gohari, Venkat Anantharam
SSPR
2004
Springer
15 years 9 months ago
Learning People Movement Model from Multiple Cameras for Behaviour Recognition
Abstract. In surveillance systems for monitoring people behaviour, it is imporant to build systems that can adapt to the signatures of the people tasks and movements in the environ...
Nam Thanh Nguyen, Svetha Venkatesh, Geoff A. W. We...
166
Voted
ECLIPSE
2005
ACM
15 years 6 months ago
Leveraging Eclipse for integrated model-based engineering of web service compositions
In this paper we detail the design and implementation of an Eclipse plug-in for an integrated, model-based approach, to the engineering of web service compositions. The plug-in al...
Howard Foster, Sebastián Uchitel, Jeff Mage...