Sciweavers

706 search results - page 61 / 142
» Reporting Flock Patterns
Sort
View
ICDCSW
2005
IEEE
14 years 3 months ago
Specifying Information-Flow Controls
The core problem in risk analysis - determining exploitable paths between attackers and system assets is essentially a problem of determining information flow. It is relatively st...
Howard Chivers, Jeremy Jacob
ICMCS
2005
IEEE
132views Multimedia» more  ICMCS 2005»
14 years 3 months ago
Automatic surveillance of the acoustic activity in our living environment
We report an experiment with an acoustic surveillance system comprised of a computer and microphone situated in a typical office environment. The system continuously analyzes the...
Aki Harma, Martin F. McKinney, Janto Skowronek
ICMCS
2005
IEEE
148views Multimedia» more  ICMCS 2005»
14 years 3 months ago
Facial Expression Recognition with Relevance Vector Machines
For many decades automatic facial expression recognition has scientifically been considered a real challenging problem in the fields of pattern recognition or robotic vision. The ...
Dragos Datcu, Léon J. M. Rothkrantz
INFOCOM
2005
IEEE
14 years 3 months ago
A disconnection-tolerant transport for drive-thru Internet environments
Abstract— Today’s mobile, wireless, and ad-hoc communications often exhibit extreme characteristics challenging assumptions underlying the traditional way of end-toend communic...
Jörg Ott, Dirk Kutscher
WECWIS
2005
IEEE
153views ECommerce» more  WECWIS 2005»
14 years 3 months ago
A Framework for Computing the Outcome of Proxied Combinatorial Auctions
Proxy bidding has been proposed for combinatorial auctions as a means to speed up the auctions, to simplify the user interface, and to limit strategic behavior. The only previousl...
Jie Zhong, Peter R. Wurman