Sciweavers

3011 search results - page 286 / 603
» Generating XML Based Specifications of Information Systems
Sort
View
125
Voted
SECURWARE
2008
IEEE
15 years 10 months ago
Security Patterns for Capturing Encryption-Based Access Control to Sensor Data
—A security pattern describes a particular recurring security problem that arises in specific contexts, and presents a well-proven generic solution for it [1]. This paper descri...
Ángel Cuevas, Paul El Khoury, Laurent Gomez...
MVA
2007
120views Computer Vision» more  MVA 2007»
15 years 5 months ago
Improvement of Cadastral Map Assembling Based on GHT
There are numerous cadastral maps generated by past land surveying. For effective and efficient use of these maps, we have to assemble the set of maps to make them superimposable ...
Fei Liu, Wataru Ohyama, Tetsushi Wakabayashi, Fumi...
TR
2010
126views Hardware» more  TR 2010»
14 years 10 months ago
Optimal Maintenance Strategies for Wind Turbine Systems Under Stochastic Weather Conditions
Abstract--We examine optimal repair strategies for wind turbines operated under stochastic weather conditions. In-situ sensors installed at wind turbines produce useful information...
Eunshin Byon, Lewis Ntaimo, Yu Ding
126
Voted
ITSSA
2006
80views more  ITSSA 2006»
15 years 3 months ago
Self-Configuring Socio-Technical Systems: Redesign at Runtime
: Modern information systems are becoming more and more socio-technical systems, namely systems composed of human (social) agents and software (technical) systems operating togethe...
Volha Bryl, Paolo Giorgini
110
Voted
ICPR
2008
IEEE
15 years 10 months ago
Enhanced speaker recognition based on intra-modal fusion and accent modeling
Speaker recognition systems, even though they have been around for four decades, have not been widely considered as standalone systems for biometric security because of their unac...
Srikanth Mangayyagari, Tanmoy Islam, Ravi Sankar