Sciweavers

2446 search results - page 231 / 490
» Principles of dataspace systems
Sort
View
HICSS
2005
IEEE
138views Biometrics» more  HICSS 2005»
15 years 11 months ago
A Method to Redesign the IS Portfolios in Large Organisations
Over the past decades, large organisations have developed increasingly complex portfolios of information systems to support business processes. Maintenance and leveraging of these...
Remco Groot, Martin Smits, Halbe Kuipers
SIGOPSE
2004
ACM
15 years 10 months ago
Trust but verify: accountability for network services
This paper promotes accountability as a central design goal for dependable networked systems. We define three properties for accountable systems that extend beyond the basic secu...
Aydan R. Yumerefendi, Jeffrey S. Chase
ISTA
2004
15 years 6 months ago
On a Network Forensics Model For Information Security
: The employment of a patchwork of nonintegrated security products can only provide incomplete coverage, which cannot give the total panorama of the network misuse behavior. Networ...
Wei Ren
ECCV
2004
Springer
16 years 7 months ago
Human Pose Estimation Using Learnt Probabilistic Region Similarities and Partial Configurations
Abstract. A model of human appearance is presented for efficient pose estimation from real-world images. In common with related approaches, a high-level model defines a space of co...
Timothy J. Roberts, Stephen J. McKenna, Ian W. Ric...
POPL
2008
ACM
16 years 5 months ago
Engineering formal metatheory
Machine-checked proofs of properties of programming languages have become a critical need, both for increased confidence in large and complex designs and as a foundation for techn...
Arthur Charguéraud, Benjamin C. Pierce, Bri...