Sciweavers

31 search results - page 5 / 7
» bcs 2008
Sort
View
BCS
2008
13 years 7 months ago
Provenance-Based Auditing of Private Data Use
Across the world, organizations are required to comply with regulatory frameworks dictating how to manage personal information. Despite these, several cases of data leaks and expo...
Rocío Aldeco-Pérez, Luc Moreau
BCS
2008
13 years 7 months ago
Web Engineering Revisited
We propose "Web Engineering 2.0" to not focus anymore on how to engineer for the Web, but how to engineer the Web. Web Engineering has become one of the core disciplines...
Erik Wilde, Martin Gaedke
BCS
2008
13 years 7 months ago
Tools for Traceable Security Verification
Dependable systems evolution has been identified by the UK Computing Research Committee (UKCRC) as one of the current grand challenges for computer science. We present work toward...
Jan Jürjens, Yijun Yu, Andreas Bauer 0002
BCS
2008
13 years 7 months ago
On Using Physical Analogies for Feature and Shape Extraction in Computer Vision
: There is a rich literature of approaches to image feature extraction in computer vision. Many sophisticated approaches exist for low- and high-level feature extraction but can be...
Mark S. Nixon, Cem Direkoglu, Xin U. Liu, David J....
BCS
2008
13 years 7 months ago
Improved SIFT-Features Matching for Object Recognition
: The SIFT algorithm (Scale Invariant Feature Transform) proposed by Lowe [1] is an approach for extracting distinctive invariant features from images. It has been successfully app...
Faraj Alhwarin, Chao Wang, Danijela Ristic-Durrant...