Sciweavers

5665 search results - page 1054 / 1133
» Introduction to Computer Security
Sort
View
TIP
2008
165views more  TIP 2008»
13 years 8 months ago
Activity Modeling Using Event Probability Sequences
Changes in motion properties of trajectories provide useful cues for modeling and recognizing human activities. We associate an event with significant changes that are localized in...
Naresh P. Cuntoor, B. Yegnanarayana, Rama Chellapp...
TKDE
2008
177views more  TKDE 2008»
13 years 8 months ago
Analyzing and Managing Role-Based Access Control Policies
Today more and more security-relevant data is stored on computer systems; security-critical business processes are mapped to their digital counterparts. This situation applies to ...
Karsten Sohr, Michael Drouineaud, Gail-Joon Ahn, M...
JMM2
2007
122views more  JMM2 2007»
13 years 8 months ago
Hierarchical Model-Based Activity Recognition With Automatic Low-Level State Discovery
Abstract— Activity recognition in video streams is increasingly important for both the computer vision and artificial intelligence communities. Activity recognition has many app...
Justin Muncaster, Yunqian Ma
CERA
2004
89views more  CERA 2004»
13 years 8 months ago
An Electronic Cash Scheme and its Management
: A secure electronic cash scheme and its role-based access control (RBAC) management are proposed in this paper. The scheme uses electronic cash for payment transactions. In this ...
Hua Wang, Yanchun Zhang, Jinli Cao
CONCURRENCY
2004
93views more  CONCURRENCY 2004»
13 years 8 months ago
Studying protein folding on the Grid: experiences using CHARMM on NPACI resources under Legion
-- One of the benefits of a computational grid is the ability to run high-performance applications over distributed resources simply and securely. We demonstrated this benefit with...
Anand Natrajan, Michael Crowley, Nancy Wilkins-Die...
« Prev « First page 1054 / 1133 Last » Next »