Sciweavers

271 search results - page 43 / 55
» From Trust to Dependability through Risk Analysis
Sort
View
POPL
2001
ACM
14 years 8 months ago
Mobile values, new names, and secure communication
We study the interaction of the "new" construct with a rich but common form of (first-order) communication. This interaction is crucial in security protocols, which are ...
Cédric Fournet, Martín Abadi
BMCBI
2007
167views more  BMCBI 2007»
13 years 7 months ago
A stochastic differential equation model for transcriptional regulatory networks
Background: This work explores the quantitative characteristics of the local transcriptional regulatory network based on the availability of time dependent gene expression data se...
Adriana Climescu-Haulica, Michelle D. Quirk
FGR
2011
IEEE
247views Biometrics» more  FGR 2011»
12 years 11 months ago
Segment and recognize expression phase by fusion of motion area and neutral divergence features
—An expression can be approximated by a sequence of temporal segments called neutral, onset, offset and apex. However, it is not easy to accurately detect such temporal segments ...
Shizhi Chen, YingLi Tian, Qingshan Liu, Dimitris N...
ICDAR
2011
IEEE
12 years 7 months ago
A Method of Evaluating Table Segmentation Results Based on a Table Image Ground Truther
—We propose a novel method to evaluate table segmentation results based on a table image ground truther. In the ground-truthing process, we first extract connected components fr...
Yanhui Liang, Yizhou Wang, Eric Saund
WSCG
2003
142views more  WSCG 2003»
13 years 9 months ago
Three-Dimensional Object Recognition: Statistical Approach
The design of a general purpose artificial vision system capable of recognizing arbitrarily complex threedimensional objects without human intervention is still a challenging task...
R. Abdul Salam, M. A. Rodrigues