Sciweavers

4911 search results - page 799 / 983
» Tree dependence analysis
Sort
View
ICISS
2007
Springer
15 years 7 months ago
Towards Automated Privilege Separation
Applications are subject to threat from a number of attack vectors, and limiting their attack surface is vital. By using privilege separation to constrain application access to pro...
Dhananjay Bapat, Kevin R. B. Butler, Patrick Drew ...
MABS
2007
Springer
15 years 6 months ago
Trust-Based Inter-temporal Decision Making: Emergence of Altruism in a Simulated Society
This paper contributes to the analysis of the question how altruistic behaviour can be in an agent’s own interest. The question is addressed by involving a temporal dimension in ...
Tibor Bosse, Martijn C. Schut, Jan Treur, David We...
SCIA
2007
Springer
153views Image Analysis» more  SCIA 2007»
15 years 6 months ago
Graph Cut Based Segmentation of Soft Shadows for Seamless Removal and Augmentation
Abstract. This paper introduces a new concept within shadow segmentation for usage in shadow removal and augmentation through construction of a multiplicity alpha overlay shadow mo...
Michael Nielsen, Claus B. Madsen
SCIA
2007
Springer
129views Image Analysis» more  SCIA 2007»
15 years 6 months ago
Efficiently Capturing Object Contours for Non-Photorealistic Rendering
Non-photorealistic rendering (NPR) techniques aim to outline the shape of objects and reduce visual clutter such as shadows and inner texture edges. As the first phase result of ou...
Jiyoung Park, Juneho Yi
SCIA
2007
Springer
122views Image Analysis» more  SCIA 2007»
15 years 6 months ago
Individual Discriminative Face Recognition Models Based on Subsets of Features
Abstract. The accuracy of data classification methods depends considerably on the data representation and on the selected features. In this work, the elastic net model selection i...
Line Harder Clemmensen, David Delgado Gomez, Bjarn...