Sciweavers

1501 search results - page 286 / 301
» Towards Integration of Modeling Methods for Cyber-Physical S...
Sort
View
CIMCA
2006
IEEE
15 years 5 months ago
A Knowledge-based Security Policy Framework for Business Process Management
Business Process Management (BPM) is often a key component of the business change. Business rules, whether embedded within BPM or on their own, have begun playing an ever-increasi...
Dong Huang, Yi Yang, Jacques Calmet
HICSS
2006
IEEE
124views Biometrics» more  HICSS 2006»
15 years 5 months ago
Gatekeeping in Virtual Communities: On Politics of Power in Cyberspace
Gatekeeping/Information Control is exercised frequently and daily in virtual communities. Gatekeeping exists in four different levels: Regulators, service providers, communitiesâ€...
Karine Barzilai-Nahon
ICPADS
2006
IEEE
15 years 5 months ago
On-line Evolutionary Resource Matching for Job Scheduling in Heterogeneous Grid Environments
In this paper, we describe a resource matcher (RM) developed for the on-line resource matching in heterogeneous grid environments. RM is based on the principles of Evolutionary Al...
Vijay K. Naik, Pawel Garbacki, Krishna Kummamuru, ...
MIR
2006
ACM
195views Multimedia» more  MIR 2006»
15 years 5 months ago
Automatically selecting shots for action movie trailers
Movie trailers, or previews, are an important method of advertising movies. They are extensively shown before movies in cinemas, as well as on television and increasingly, over th...
Alan F. Smeaton, Bart Lehane, Noel E. O'Connor, Co...
ICMCS
2005
IEEE
113views Multimedia» more  ICMCS 2005»
15 years 4 months ago
HMM-Based Deception Recognition from Visual Cues
Behavioral indicators of deception and behavioral state are extremely difficult for humans to analyze. This research effort attempts to leverage automated systems to augment human...
Gabriel Tsechpenakis, Dimitris N. Metaxas, Mark Ad...