Sciweavers

1976 search results - page 353 / 396
» Application Semiotics Engineering Process
Sort
View
IFIPTM
2010
145views Management» more  IFIPTM 2010»
13 years 7 months ago
A Formal Notion of Trust - Enabling Reasoning about Security Properties
Historically, various different notions of trust can be found, each addressing particular aspects of ICT systems, e.g. trust in electronic commerce systems based on reputation and...
Andreas Fuchs, Sigrid Gürgens, Carsten Rudolp...
SACMAT
2010
ACM
13 years 7 months ago
Role mining based on weights
Role mining from the existing permissions has been widely applied to aid the process of migrating to an RBAC system. While all permissions are treated evenly in previous approache...
Xiaopu Ma, Ruixuan Li, Zhengding Lu
TIP
2010
150views more  TIP 2010»
13 years 7 months ago
Study of Subjective and Objective Quality Assessment of Video
Abstract—We present the results of a recent large-scale subjective study of video quality on a collection of videos distorted by a variety of application-relevant processes. Meth...
Kalpana Seshadrinathan, Rajiv Soundararajan, Alan ...
AND
2010
13 years 6 months ago
A platform for storing, visualizing, and interpreting collections of noisy documents
The goal of document image analysis is to produce interpretations that match those of a uent and knowledgeable human when viewing the same input. Because computer vision technique...
Bart Lamiroy, Daniel P. Lopresti
SIES
2010
IEEE
13 years 6 months ago
Verification of a CAN bus model in SystemC with functional coverage
Abstract--Many heterogeneous embedded systems, for example industrial automation and automotive applications, require hard-real time constraints to be exhaustively verified - which...
Christoph Kuznik, Gilles B. Defo, Wolfgang Mü...