Sciweavers

392 search results - page 59 / 79
» Privacy Requirement Modeling and Verification in Cloud Compu...
Sort
View
DICTA
2009
13 years 8 months ago
Soft-Biometrics: Unconstrained Authentication in a Surveillance Environment
Soft biometrics are characteristics that can be used to describe, but not uniquely identify an individual. These include traits such as height, weight, gender, hair, skin and cloth...
Simon Denman, Clinton Fookes, Alina Bialkowski, Sr...
ICCV
2003
IEEE
15 years 14 days ago
Recognising Panoramas
The problem considered in this paper is the fully automatic construction of panoramas. Fundamentally, this problem requires recognition, as we need to know which parts of the pano...
Matthew Brown, David G. Lowe
ECOWS
2008
Springer
14 years 10 days ago
Beyond Soundness: On the Semantic Consistency of Executable Process Models
Executable business process models build on the specification of process activities, their implemented business functions (e.g., Web services) and the control flow between these a...
Ingo Weber, Jörg Hoffmann, Jan Mendling
BIOINFORMATICS
2010
127views more  BIOINFORMATICS 2010»
13 years 10 months ago
Analyzing taxonomic classification using extensible Markov models
Motivation: As next generation sequencing is rapidly adding new genomes, their correct placement in the taxonomy needs verification. However, the current methods for confirming cl...
Rao M. Kotamarti, Michael Hahsler, Douglas Raiford...
OTM
2010
Springer
13 years 8 months ago
On the Expressiveness and Trade-Offs of Large Scale Tuple Stores
Massive-scale distributed computing is a challenge at our doorstep. The current exponential growth of data calls for massive-scale capabilities of storage and processing. This is b...
Ricardo Vilaça, Francisco Cruz, Rui Carlos ...