Sciweavers

3972 search results - page 42 / 795
» Cosparse analysis modeling - uniqueness and algorithms
Sort
View
ICICS
2005
Springer
15 years 9 months ago
Network Vulnerability Analysis Through Vulnerability Take-Grant Model (VTG)
Modeling and analysis of information system vulnerabilities helps us to predict possible attacks to networks using the network configuration and vulnerabilities information. As a f...
Hamid Reza Shahriari, Reza Sadoddin, Rasool Jalili...
FGR
2006
IEEE
144views Biometrics» more  FGR 2006»
15 years 9 months ago
A Layered Deformable Model for Gait Analysis
In this paper, a layered deformable model (LDM) is proposed for human body pose recovery in gait analysis. This model is inspired by the manually labeled silhouettes in [6] and it...
Haiping Lu, Konstantinos N. Plataniotis, Anastasio...
EXPERT
2010
145views more  EXPERT 2010»
15 years 1 months ago
Interaction Analysis with a Bayesian Trajectory Model
Human behavior recognition is one of the most important and challenging objectives performed by intelligent vision systems. Several issues must be faced in this domain ranging fro...
Alessio Dore, Carlo S. Regazzoni
CIKM
2010
Springer
15 years 1 months ago
Modeling reformulation using passage analysis
Query reformulation modifies the original query with the aim of better matching the vocabulary of the relevant documents, and consequently improving ranking effectiveness. Previou...
Xiaobing Xue, W. Bruce Croft, David A. Smith
CAV
2007
Springer
110views Hardware» more  CAV 2007»
15 years 10 months ago
Hector: Software Model Checking with Cooperating Analysis Plugins
We present Hector, a software tool for combining different abstraction methods to extract sound models of heap-manipulating imperative programs with recursion. Extracted models ma...
Nathaniel Charlton, Michael Huth