Sciweavers

2043 search results - page 279 / 409
» Reasoning About Security Models
Sort
View
101
Voted
CVPR
2006
IEEE
16 years 2 months ago
Gesture Recognition using Hidden Markov Models from Fragmented Observations
We consider the problem of computing the likelihood of a gesture from regular, unaided video sequences, without relying on perfect segmentation of the scene. Instead of requiring ...
Ruiduo Yang, Sudeep Sarkar
GIS
2008
ACM
16 years 1 months ago
Charting new ground: modeling user behavior in interactive geovisualization
Geovisualization has traditionally played a critical role in analysis and decision-making, but recent developments have also brought a revolution in widespread online access to ge...
David C. Wilson, Heather Richter Lipford, Erin Car...
106
Voted
CAISE
2007
Springer
15 years 7 months ago
Analyzing the Business of Software: A Modelling Technique for Software Supply Networks
Abstract. One of the most significant paradigm shifts of software business management is that individual organizations no longer compete as single entities but as complex dynamic ...
Slinger Jansen, Anthony Finkelstein, Sjaak Brinkke...
132
Voted
KBSE
1995
IEEE
15 years 4 months ago
A Model for Decision Maintenance in the WinWin Collaboration Framework
Cost-effective engineering and evolution of complex software must involve the different stakeholders concurrently and collaboratively. The hard problem is providing computer suppo...
Prasanta K. Bose
APCCM
2006
15 years 2 months ago
Defining and implementing domains with multiple types using mesodata modelling techniques
The integration of data from different sources often leads to the adoption of schemata that entail a loss of information in respect of one or more of the data sets being combined....
Sally Rice, John F. Roddick, Denise de Vries