Sciweavers

148 search results - page 20 / 30
» Exploiting Semantics for Event Detection Systems
Sort
View
AIMS
2007
Springer
14 years 1 months ago
Harnessing Models for Policy Conflict Analysis
Policy conflict analysis processes based solely on the examination of policy language constructs can not readily discern the semantics associated with the managed system for which ...
Steven Davy, Brendan Jennings
EUROCAST
2007
Springer
161views Hardware» more  EUROCAST 2007»
13 years 11 months ago
Using Verification Technology to Specify and Detect Malware
Abstract. Computer viruses and worms are major threats for our computer infrastructure, and thus, for economy and society at large. Recent work has demonstrated that a model checki...
Andreas Holzer, Johannes Kinder, Helmut Veith
TKDE
2008
122views more  TKDE 2008»
13 years 7 months ago
Protection of Database Security via Collaborative Inference Detection
Malicious users can exploit the correlation among data to infer sensitive information from a series of seemingly innocuous data accesses. Thus, we develop an inference violation d...
Yu Chen, Wesley W. Chu
MM
2005
ACM
112views Multimedia» more  MM 2005»
14 years 1 months ago
MediaMill: exploring news video archives based on learned semantics
In this technical demonstration we showcase the MediaMill system. A search engine that facilitates access to news video archives at a semantic level. The core of the system is an ...
Cees Snoek, Marcel Worring, Jan van Gemert, Jan-Ma...
ICIAR
2004
Springer
14 years 28 days ago
Appearance-Based Object Detection in Space-Variant Images: A Multi-model Approach
Recently, log-polar images have been successfully used in active-vision tasks such as vergence control or target tracking. However, while the role of foveal data has been exploited...
V. Javier Traver, Alexandre Bernardino, Plinio Mor...