Abstract. Even the most well-motivated models of information security have application limitations due to the inherent uncertainties involving risk. This paper exemplifies a formal...
Benjamin Johnson, Jens Grossklags, Nicolas Christi...
This paper introduces a simple and efficient representation for natural images. We partition an image into blocks and treat the blocks as vectors in a high-dimensional space. We t...
Active Shape Models (ASM) have proven to be an effective approach for image segmentation. In some applications, however, the linear model of gray level appearance around a contour ...
Marleen de Bruijne, Bram van Ginneken, Max A. Vier...
Abstract Many Multi-Agent Systems (MAS) methodologies incorporate a modeldriven approach. Model Driven Engineering is based on three main ideas: models are the “first-class citi...
: 3D technologies open up new possibilities for modeling business processes. They provide higher plasticity and eliminate some deficits of conventional 2D process modeling such as ...
Stefanie Betz, Daniel Eichhorn, Susan Hickl, Stefa...