Sciweavers

1795 search results - page 203 / 359
» Security Models and Information Flow
Sort
View
CCS
2008
ACM
15 years 6 months ago
User-controllable learning of security and privacy policies
Studies have shown that users have great difficulty specifying their security and privacy policies in a variety of application domains. While machine learning techniques have succ...
Patrick Gage Kelley, Paul Hankes Drielsma, Norman ...
GIS
2009
ACM
16 years 5 months ago
Efficient and Secure Distribution of Massive Geo-Spatial Data
Modern geographic databases can contain a large volume of data that need to be distributed to subscribed customers. The data can be modeled as a cube, where typical dimensions inc...
Hao Yuan, Mikhail J. Atallah
ICIP
2008
IEEE
16 years 6 months ago
Geodesic active regions for segmentation and tracking of human gestures in sign language videos
Reliable segmentation and motion tracking algorithms are required to achieve gesture detection and tracking for human-machine interaction. In this paper we present an efficient me...
Olga Diamanti, Petros Maragos
WWW
2003
ACM
16 years 5 months ago
A new paradigm for ranking pages on the world wide web
This paper describes a new paradigm for modeling traffic levels on the world wide web (WWW) using a method of entropy maximization. This traffic is subject to the conservation con...
John A. Tomlin
CVIU
2006
110views more  CVIU 2006»
15 years 4 months ago
Viewpoint invariant exemplar-based 3D human tracking
This paper proposes a clustered exemplar-based model for performing viewpoint invariant tracking of the 3D motion of a human subject from a single camera. Each exemplar is associa...
Eng-Jon Ong, Antonio S. Micilotta, Richard Bowden,...