Sciweavers

535 search results - page 61 / 107
» Do we need dependent types
Sort
View
IEEEARES
2006
IEEE
14 years 1 months ago
Secure Business Process Management: A Roadmap
— The security of corporate business processes is crucial for the business success of companies. Existing Business Process Management methodologies barely consider security and d...
Thomas Neubauer, Markus D. Klemen, Stefan Biffl
ISSA
2008
13 years 9 months ago
The Impact of Information Security Awareness Training on Information Security Behaviour: The Case for Further Research
Information Security awareness initiatives are seen as critical to any information security programme. But, how do we determine the effectiveness of these awareness initiatives? W...
Tony Stephanou, Rabelani Dagada
WEBIST
2008
13 years 9 months ago
Feeling Expression Using Avatars and Its Consistency for Subjective Annotation
Consumer Generated Media(CGM) is growing rapidly and the amount of content is increasing. However, it is often difficult for users to extract important contents and the existence o...
Fuyuko Ito, Yasunari Sasaki, Tomoyuki Hiroyasu, Mi...
ICPR
2010
IEEE
13 years 5 months ago
Unsupervised Image Retrieval with Similar Lighting Conditions
In this work a new method to retrieve images with similar lighting conditions is presented. It is based on automatic clustering and automatic indexing. Our proposal belongs to Con...
J. Felix Serrano, Carlos Avilés, Humberto S...
ICASSP
2011
IEEE
12 years 11 months ago
Synthesis of ICA-based methods for localization of multiple broadband sound sources
In this paper, minimization of the statistical dependence is exploited for acoustic source localization purposes. Originally developed for the separation of signal mixtures, we sh...
Anthony Lombard, Yuanhang Zheng, Walter Kellermann