Sciweavers

577 search results - page 102 / 116
» An Active Hypertext Model for System Requirements
Sort
View
MINENET
2006
ACM
15 years 10 months ago
Diagnosis of TCP overlay connection failures using bayesian networks
When failures occur in Internet overlay connections today, it is difficult for users to determine the root cause of failure. An overlay connection may require TCP connections bet...
George J. Lee, Lindsey Poole
SAC
2004
ACM
15 years 9 months ago
Trust enhanced ubiquitous payment without too much privacy loss
Computational models of trust have been proposed for use in ubicomp environments for deciding whether to allow customers to pay with an e-purse or not. In order to build trust in ...
Jean-Marc Seigneur, Christian Damsgaard Jensen
MABS
2004
Springer
15 years 9 months ago
A Hybrid Micro-Simulator for Determining the Effects of Governmental Control Policies on Transport Chains
Abstract. A simulation-based tool is described which will be used to investigate how the actors in a transport chain are expected to act when different types of governmental contro...
Markus Bergkvist, Paul Davidsson, Jan A. Persson, ...
MM
2010
ACM
252views Multimedia» more  MM 2010»
15 years 4 months ago
Real-time detection of unusual regions in image streams
Automatic and real-time identification of unusual incidents is important for event detection and alarm systems. In today's camera surveillance solutions video streams are dis...
Rene Schuster, Roland Mörzinger, Werner Haas,...
PAMI
2006
106views more  PAMI 2006»
15 years 4 months ago
Statistical Analysis of Dynamic Actions
Real-world action recognition applications require the development of systems which are fast, can handle a large variety of actions without a priori knowledge of the type of actio...
Lihi Zelnik-Manor, Michal Irani