Sciweavers

6750 search results - page 1068 / 1350
» Performance Analysis Framework for Layout Analysis Methods
Sort
View
ISI
2006
Springer
15 years 4 months ago
Cost-Sensitive Access Control for Illegitimate Confidential Access by Insiders
Abstract. In many organizations, it is common to control access to confidential information based on the need-to-know principle; The requests for access are authorized only if the ...
Young-Woo Seo, Katia P. Sycara
JAIR
2006
141views more  JAIR 2006»
15 years 4 months ago
An Approach to Temporal Planning and Scheduling in Domains with Predictable Exogenous Events
The treatment of exogenous events in planning is practically important in many realworld domains where the preconditions of certain plan actions are affected by such events. In th...
Alfonso Gerevini, Alessandro Saetti, Ivan Serina
CVIU
2007
180views more  CVIU 2007»
15 years 4 months ago
Mutual information based registration of multimodal stereo videos for person tracking
Research presented in this paper deals with the systematic examination, development, and evaluation of a novel multimodal registration approach that can perform accurately and rob...
Stephen J. Krotosky, Mohan M. Trivedi
JSW
2008
98views more  JSW 2008»
15 years 4 months ago
Towards a Collaborative and Systematic Approach to Alert Verification
With the menace of hackers increasing every day, even well administrated networks are vulnerable to attack. Therefore, securing network assets has become a significant issue for th...
Xuejiao Liu, Debao Xiao, Xi Peng
IJWGS
2007
88views more  IJWGS 2007»
15 years 4 months ago
Parallel programming over ChinaGrid
: Grid computing is becoming more and more attractive for providing a convenient uniform platform for coordinating highly distributed and heterogeneous resources and services. In t...
Weiyuan Huang, Yongwei Wu, Yulai Yuan, Jia Liu, Gu...
« Prev « First page 1068 / 1350 Last » Next »