Sciweavers

941 search results - page 118 / 189
» The Second Order Particle System
Sort
View
POLICY
2001
Springer
15 years 2 months ago
IPSec/VPN Security Policy: Correctness, Conflict Detection, and Resolution
IPSec (Internet Security Protocol Suite) functions will be executed correctly only if its policies are correctly specified and configured. Manual IPSec policy configuration is inef...
Zhi Fu, Shyhtsun Felix Wu, He Huang, Kung Loh, Fen...
ESE
1990
128views Database» more  ESE 1990»
15 years 1 months ago
Characterizing Diagnoses
Most approaches to model-based diagnosis describe a diagnosis for a system as a set of failing components that explains the symptoms. In order to characterize the typically very l...
Johan de Kleer, Alan K. Mackworth, Raymond Reiter
DALT
2006
Springer
15 years 1 months ago
Producing Compliant Interactions: Conformance, Coverage, and Interoperability
Agents in an open system interact with each other based on (typically, published) protocols. An agent may, however, deviate from the protocol because of its internal policies. Such...
Amit K. Chopra, Munindar P. Singh
ICCV
1995
IEEE
15 years 1 months ago
Facial Expression Recognition Using a Dynamic Model and Motion Energy
Previous efforts at facial expression recognition have been based on the Facial Action Coding System (FACS), a representation developed in order to allow human psychologists to co...
Irfan A. Essa, Alex Pentland
ESWS
2008
Springer
14 years 11 months ago
Enriching an Ontology with Multilingual Information
Organizations working in a multilingual environment demand multilingual ontologies. To solve this problem we propose LabelTranslator, a system that automatically localizes ontologi...
Mauricio Espinoza, Asunción Gómez-P&...