Sciweavers

4445 search results - page 207 / 889
» Reflective Authorization Systems
Sort
View
ADVCS
2004
65views more  ADVCS 2004»
15 years 4 months ago
Multiscale Complexity/Entropy
We discuss the role of scale dependence of entropy/complexity and its relationship to component interdependence. The complexity as a function of scale of observation is expressed ...
Y. Bar-Yam
IEEEVAST
2010
14 years 11 months ago
A continuous analysis process between desktop and collaborative visual analytics environments
Since its inception, the field of visual analytics has undergone tremendous growth in understanding how to create interactive visual tools to solve analytical problems. However, w...
Dong Hyun Jeong, Evan A. Suma, Thomas Butkiewicz, ...
138
Voted
FTDCS
1997
IEEE
15 years 9 months ago
The Saga Security System: A Security Architecture for Open Distributed Systems
In the paper we present an overview of Saga Security System, a security architecture in open distributed systems. An agent in Saga Security System is called a Saga Agent. The auth...
Masakazu Soshi, Mamoru Maekawa
CVPR
2003
IEEE
16 years 7 months ago
Illumination Normalization with Time-dependent Intrinsic Images for Video Surveillance
Cast shadows produce troublesome effects for video surveillance systems, typically for object tracking from a fixed viewpoint, since it yields appearance variations of objects dep...
Yasuyuki Matsushita, Ko Nishino, Katsushi Ikeuchi,...
ICPR
2006
IEEE
16 years 6 months ago
Recognizing Rotated Faces from Two Orthogonal Views in Mugshot Databases
Tolerance to pose variations is one of the key remaining problems in face recognition. It is of great interest in airport surveillance systems using mugshot databases to screen tr...
Xiaozheng Zhang, Yongsheng Gao, Bailing Zhang