Sciweavers

5615 search results - page 55 / 1123
» On the Computational Capabilities of Several Models
Sort
View
IJNSEC
2008
88views more  IJNSEC 2008»
13 years 9 months ago
Security Requirements for RFID Computing Systems
Many security and privacy protocols for RFID systems have been proposed [8, 13, 19, 20]. In most cases these protocols are evaluated in terms of security based on some model. Ofte...
Xiaolan Zhang 0003, Brian King
ACCV
2010
Springer
13 years 4 months ago
MRF-Based Background Initialisation for Improved Foreground Detection in Cluttered Surveillance Videos
Abstract. Robust foreground object segmentation via background modelling is a difficult problem in cluttered environments, where obtaining a clear view of the background to model i...
Vikas Reddy, Conrad Sanderson, Andres Sanin, Brian...
ICIP
2007
IEEE
14 years 11 months ago
Video Content Representation by Incremental Non-Negative Matrix Factorization
Nonnegative Matrix Factorization (NMF) is a powerful decomposition tool which has been used in several content representation applications recently. However, there are some diffic...
Bilge Günsel, Serhat Selcuk Bucak
AUTONOMICS
2008
ACM
13 years 11 months ago
Autonomic management via dynamic combinations of reusable strategies
Autonomic Management capabilities become increasingly important for attaining functional and quality goals in software systems. Nonetheless, successful Autonomic Management soluti...
Ada Diaconescu, Yoann Maurel, Philippe Lalanda
BIS
2009
146views Business» more  BIS 2009»
13 years 7 months ago
Computer Support for Agile Human-to-Human Interactions with Social Protocols
Despite many works in CSCW, groupware, workflow systems and social networks, computer support for human-to-human interactions is still insufficient, especially support for agility,...
Willy Picard