Sciweavers

3193 search results - page 581 / 639
» A Security Risk Analysis Model for Information Systems
Sort
View
APN
2007
Springer
14 years 3 months ago
History-Dependent Petri Nets
Most information systems that are driven by process models (e.g., workflow management systems) record events in event logs, also known as transaction logs or audit trails. We cons...
Kees M. van Hee, Alexander Serebrenik, Natalia Sid...
HICSS
2003
IEEE
110views Biometrics» more  HICSS 2003»
14 years 2 months ago
Telecommunication Infrastructure Investments and Firm Performance
This research adopts Barua’s [1] three-tier Business Value Complementarity (BVC) model to study the performance of telephone companies (Telcos). Our study integrates constructs ...
Hy Sonya Hsu, Siva K. Balasubramanian
MM
2009
ACM
168views Multimedia» more  MM 2009»
14 years 1 months ago
Identifying news videos' ideological perspectives using emphatic patterns of visual concepts
Television news has become the predominant way of understanding the world around us, but individual news broadcasters can frame or mislead an audience’s understanding of politic...
Wei-Hao Lin, Alexander G. Hauptmann
ICALP
2010
Springer
13 years 11 months ago
Example-Guided Abstraction Simplification
Guided Abstraction Simplification Roberto Giacobazzi1 and Francesco Ranzato2 1 University of Verona, Italy 2 University of Padova, Italy Abstract. In static analysis, approximation...
Roberto Giacobazzi, Francesco Ranzato
TIP
2008
344views more  TIP 2008»
13 years 9 months ago
A Self-Organizing Approach to Background Subtraction for Visual Surveillance Applications
Detection of moving objects in video streams is the first relevant step of information extraction in many computer vision applications. Aside from the intrinsic usefulness of being...
Lucia Maddalena, Alfredo Petrosino