Sciweavers

1795 search results - page 128 / 359
» Security Models and Information Flow
Sort
View
OTM
2005
Springer
15 years 9 months ago
On the Controlled Evolution of Access Rules in Cooperative Information Systems
Abstract. For several reasons enterprises are frequently subject to organizational change. Respective adaptations may concern business processes, but also other components of an en...
Stefanie Rinderle, Manfred Reichert
CCS
2010
ACM
15 years 4 months ago
DIFC programs by automatic instrumentation
Decentralized information flow control (DIFC) operating systems provide applications with mechanisms for enforcing information-flow policies for their data. However, significant o...
William R. Harris, Somesh Jha, Thomas W. Reps
ATAL
2010
Springer
15 years 4 months ago
Model checking detectability of attacks in multiagent systems
Information security is vital to many multiagent system applications. In this paper we formalise the notion of detectability of attacks in a MAS setting and analyse its applicabil...
Ioana Boureanu, Mika Cohen, Alessio Lomuscio
CVPR
2010
IEEE
16 years 8 days ago
Probabilistic 3D Occupancy Flow with Latent Silhouette Cues
In this paper we investigate shape and motion retrieval in the context of multi-camera systems. We propose a new lowlevel analysis based on latent silhouette cues, particularly su...
Li Guan, Jean-Sebastien Franco, Edmond Boyer, Marc...
ACCV
2009
Springer
15 years 10 months ago
Crowd Flow Characterization with Optimal Control Theory
Abstract. Analyzing the crowd dynamics from video sequences is an open challenge in computer vision. Under a high crowd density assumption, we characterize the dynamics of the crow...
Pierre Allain, Nicolas Courty, Thomas Corpetti