Sciweavers

732 search results - page 126 / 147
» Periodicity-Based Temporal Constraints
Sort
View
VLSM
2005
Springer
14 years 3 months ago
Implicit Free-Form-Deformations for Multi-frame Segmentation and Tracking
Abstract. In this paper, we propose a novel technique to address motion estimation and tracking. Such technique represents the motion field using a regular grid of thin-plate spli...
Konstantinos Karantzalos, Nikos Paragios
SACMAT
2004
ACM
14 years 3 months ago
X-GTRBAC admin: a decentralized administration model for enterprise wide access control
Access control in enterprises is a key research area in the realm of Computer Security because of the unique needs of the target enterprise. As the enterprise typically has large ...
Rafae Bhatti, James Joshi, Elisa Bertino, Arif Gha...
ICEIS
2003
IEEE
14 years 3 months ago
Distributed Overload Control for Real-Time Replicated Database Systems
: In order to meet their temporal constraints, current applications such as Web-based services and electronic commerce use the technique of data replication. To take the replicatio...
Samia Saad-Bouzefrane, Claude Kaiser
INFOCOM
2003
IEEE
14 years 3 months ago
Optimal replacement policies for non-uniform cache objects with optional eviction
Abstract— Replacement policies for general caching applications and Web caching in particular have been discussed extensively in the literature. Many ad-hoc policies have been pr...
Omri Bahat, Armand M. Makowski
CCS
2003
ACM
14 years 3 months ago
Learning attack strategies from intrusion alerts
Understanding the strategies of attacks is crucial for security applications such as computer and network forensics, intrusion response, and prevention of future attacks. This pap...
Peng Ning, Dingbang Xu