Sciweavers

1370 search results - page 197 / 274
» On the Consistent Observation of Active Systems
Sort
View
CCS
2008
ACM
13 years 10 months ago
On spatio-temporal constraints and inheritance in role-based access control
Pervasive computing environments have created a requirement for spatial- and temporal-aware access control systems. Although temporal, spatial and spatio-temporal role-based acces...
Liang Chen, Jason Crampton
IFIP11
2004
141views Business» more  IFIP11 2004»
13 years 10 months ago
Identity Management for Self-Portrayal
Identity management systems help users to organise their digital profiles in order to communicate parts of them, whenever needed and wanted, to communication partners like internet...
Tobias Baier, Christian P. Kunze
IFIP13
2004
13 years 10 months ago
Toward A Human-Centered UML For Risk Analysis
: Safety is now a major concern in many complex systems such as medical robots. A way to control the complexity of such systems is to manage risk. The first and important step of t...
Jérémie Guiochet, Gilles Motet, Clau...
ACL
1998
13 years 10 months ago
Dialogue Management in Vector-Based Call Routing
This paper describes a domain independent, automatically trained call router which directs customer calls based on their response to an open-ended "How may I direct your call...
Jennifer Chu-Carroll, Bob Carpenter
PR
2006
115views more  PR 2006»
13 years 8 months ago
Visual surveillance by dynamic visual attention method
This paper describes a method for visual surveillance based on biologically motivated dynamic visual attention in video image sequences. Our system is based on the extraction and ...
María T. López, Antonio Ferná...