Sciweavers

2043 search results - page 260 / 409
» Reasoning About Security Models
Sort
View
104
Voted
ECCV
2010
Springer
15 years 5 months ago
Cascaded Confidence Filtering for Improved Tracking-by-Detection
We propose a novel approach to increase the robustness of object detection algorithms in surveillance scenarios. The cascaded confidence filter successively incorporates constraint...
FAABS
2000
Springer
15 years 4 months ago
Formal Agent Development: Framework to System
Much work in the field of agent-based systems has tended to focus on either the development of practical applications of agent systems on the one hand, or the development of sophis...
Mark d'Inverno, Michael Luck
90
Voted
CAV
2010
Springer
197views Hardware» more  CAV 2010»
15 years 4 months ago
Abstract Analysis of Symbolic Executions
Analysis of Symbolic Executions Aws Albarghouthi1 , Arie Gurfinkel2 , Ou Wei1,3 , and Marsha Chechik1 1 Department of Computer Science, University of Toronto, Canada 2 Software Eng...
Aws Albarghouthi, Arie Gurfinkel, Ou Wei, Marsha C...
FLAIRS
2007
15 years 3 months ago
Accessing XML Documents Using Semantic Meta Data in a P2P Environment
XGR (XML Data Grid) and BabelPeers are both data management systems based on distributed hash tables (DHT) that use the Pastry DHT to store data and meta data. XGR is based on the...
Dominic Battré, Felix Heine, André H...
98
Voted
CLIMA
2007
15 years 2 months ago
Actions with Failures in Interval Temporal Logic
Abstract. Failures are unavoidable in many circumstances. For example, an agent may fail at some point to perform a task in a dynamic environment. Robust systems typically have mec...
Arjen Hommersom, Peter J. F. Lucas