Sciweavers

3926 search results - page 41 / 786
» Deriving Information Requirements from Responsibility Models
Sort
View
ACMICEC
2007
ACM
129views ECommerce» more  ACMICEC 2007»
15 years 7 months ago
Modeling trust in e-commerce: an approach based on user requirements
E-commerce is presently operating under its expected capacity, mainly because traders find it very difficult to trust one another online for trading decisions. It is therefore ver...
Alireza Pourshahid, Thomas T. Tran
ICDE
2009
IEEE
147views Database» more  ICDE 2009»
16 years 5 months ago
Separating Authentication from Query Execution in Outsourced Databases
-- In the database outsourcing paradigm, a data owner (DO) delegates its DBMS administration to a specialized service provider (SP) that receives and processes queries from clients...
Stavros Papadopoulos, Dimitris Papadias, Weiwei Ch...
RE
2002
Springer
15 years 3 months ago
A Software Fault Tree Approach to Requirements Analysis of an Intrusion Detection System
Requirements analysis for an Intrusion Detection System (IDS) involves deriving requirements for the IDS from analysis of the intrusion domain. When the IDS is, as here, a collecti...
Guy G. Helmer, Johnny S. Wong, Mark Slagell, Vasan...
CVPR
2008
IEEE
15 years 10 months ago
Learning a geometry integrated image appearance manifold from a small training set
While low-dimensional image representations have been very popular in computer vision, they suffer from two limitations: (i) they require collecting a large and varied training se...
Yilei Xu, Amit K. Roy Chowdhury
TASLP
2010
165views more  TASLP 2010»
14 years 10 months ago
Model-Based Dereverberation Preserving Binaural Cues
The ability of the human auditory system for sound localization mainly depends on the binaural cues, especially interaural time and level differences (ITD and ILD). In the context ...
Marco Jeub, M. Schafer, Thomas Esch, Peter Vary