Sciweavers

1024 search results - page 118 / 205
» Compositional Methods for Probabilistic Systems
Sort
View
FASE
2010
Springer
13 years 5 months ago
A Verifiable Modeling Approach to Configurable Role-Based Access Control
Role-based access control (RBAC) is a popular access control model for enterprise systems due to its economic benefit and scalability. There are many RBAC features available, each ...
Dae-Kyoo Kim, Lunjin Lu, Sangsig Kim
JIPS
2010
176views more  JIPS 2010»
13 years 2 months ago
Recognition of Human Facial Expression in a Video Image using the Active Appearance Model
Tracking human facial expression within a video image has many useful applications, such as surveillance and teleconferencing, etc. Initially, the Active Appearance Model (AAM) was...
Gyeong-Sic Jo, Yong-Guk Kim
CHI
2006
ACM
14 years 8 months ago
Gaze-based interaction for semi-automatic photo cropping
We present an interactive method for cropping photographs given minimal information about the location of important content, provided by eye tracking. Cropping is formulated in a ...
Anthony Santella, Maneesh Agrawala, Douglas DeCarl...
IFM
2004
Springer
14 years 1 months ago
Verifying Controlled Components
Recent work on combining CSP and B has provided ways of describing systems comprised of components described in both B (to express requirements on state) and CSP (to express intera...
Steve Schneider, Helen Treharne
FUIN
2008
123views more  FUIN 2008»
13 years 8 months ago
Interface Automata with Complex Actions: Limiting Interleaving in Interface Automata
Abstract. Many formalisms use interleaving to model concurrency. To describe some system behaviours appropriately, we need to limit interleaving. For example, in a component-based ...
Shahram Esmaeilsabzali, Nancy A. Day, Farhad Mavad...