Sciweavers

3193 search results - page 546 / 639
» A Security Risk Analysis Model for Information Systems
Sort
View
CVPR
1997
IEEE
14 years 2 months ago
3D Reconstruction of the Human Jaw from A Sequence of Images
A novel approach is proposed to obtain a record of the patient’s occlusion using computer vision. Data acquisition is obtained using intra-oral video cameras. The technique utili...
Moumen T. Ahmed, Sameh M. Yamany, Elsayed E. Hemay...
AAAI
1990
13 years 11 months ago
Accent and Discourse Context: Assigning Pitch Accent in Synthetic Speech
Identifying the regularities underlying speaker decisions to emphasize or de-emphasize an item intonationally has long been the subject of speculation and controversy. This paper ...
Julia Hirschberg
PCI
2005
Springer
14 years 3 months ago
A Graphical Rule Authoring Tool for Defeasible Reasoning in the Semantic Web
Defeasible reasoning is a rule-based approach for efficient reasoning with incomplete and inconsistent information. Such reasoning is useful for many applications in the Semantic W...
Nick Bassiliades, Efstratios Kontopoulos, Grigoris...
PODS
2011
ACM
163views Database» more  PODS 2011»
13 years 1 months ago
Provenance views for module privacy
Scientific workflow systems increasingly store provenance information about the module executions used to produce a data item, as well as the parameter settings and intermediate...
Susan B. Davidson, Sanjeev Khanna, Tova Milo, Debm...
CAISE
2001
Springer
14 years 2 months ago
Relaxed Soundness of Business Processes
Business processes play a central role in the reorganization of a company and the (re)design of the respective information system(s). Typically the processes are described with the...
Juliane Dehnert, Peter Rittgen