Sciweavers

1414 search results - page 45 / 283
» Combining Intruder Theories
Sort
View
FLAIRS
2003
13 years 11 months ago
Low Level Fusion of Imagery Based on Dempster-Shafer Theory
An approach to fuse multiple images based on Dempster-Shafer evidential reasoning is proposed in this article. Dempster-Shafer theory provides a complete framework for combining w...
Xiaohui Yuan, Jian Zhang 0007, Xiaojing Yuan, Bill...
IDA
2010
Springer
13 years 8 months ago
Three alternative combinatorial formulations of the theory of evidence
In this paper we introduce three alternative combinatorial formulations of the theory of evidence (ToE), by proving that both plausibility and commonality functions share the stru...
Fabio Cuzzolin
UTP
2010
13 years 7 months ago
Unifying Theories of Confidentiality
Abstract. This paper presents a framework for reasoning about the security of confidential data within software systems. A novelty is that we use Hoare and He's Unifying Theor...
Michael J. Banks, Jeremy L. Jacob
ECSQARU
2009
Springer
13 years 7 months ago
Can the Minimum Rule of Possibility Theory Be Extended to Belief Functions?
Abstract. When merging belief functions, Dempster rule of combination is justified only when sources can be considered as independent. When dependencies are ill-known, it is usual ...
Sébastien Destercke, Didier Dubois
ICIAR
2007
Springer
14 years 4 months ago
High Accuracy Optical Flow Method Based on a Theory for Warping: Implementation and Qualitative/Quantitative Evaluation
Abstract. We describe the implementation of a 2D optical flow algorithm published in the European Conference on Computer Vision (ECCV 2004) by Brox et al. [1] (best paper award) a...
Mohammad Faisal, John Barron