Sciweavers

1795 search results - page 259 / 359
» Security Models and Information Flow
Sort
View
SAC
2008
ACM
13 years 8 months ago
Anomaly detection algorithms in logs of process aware systems
Today, there is a variety of systems that support business process as a whole or partially. However, normative systems are not appropriate for some domains (e.g. health care) as a...
Fábio de Lima Bezerra, Jacques Wainer
CVPR
2008
IEEE
14 years 11 months ago
Interactive image segmentation via minimization of quadratic energies on directed graphs
We propose a scheme to introduce directionality in the Random Walker algorithm for image segmentation. In particular, we extend the optimization framework of this algorithm to com...
Dheeraj Singaraju, Leo Grady, René Vidal
MM
2003
ACM
161views Multimedia» more  MM 2003»
14 years 2 months ago
MuSA.RT: music on the spiral array. real-time
We present MuSA.RT, Opus 1, a multimodal interactive system for music analysis and visualization using the Spiral Array model. Real-time MIDI input from a live performance is proc...
Elaine Chew, Alexandre R. J. François
DSVIS
2008
Springer
13 years 10 months ago
Towards a Library of Workflow User Interface Patterns
Abstract. A collection of user interface design patterns for workflow information systems is presented. Each Workflow User Interface Pattern (WUIP) is characterized by properties e...
Josefina Guerrero García, Jean Vanderdonckt...
EUROCRYPT
2010
Springer
14 years 1 months ago
Public-Key Encryption in the Bounded-Retrieval Model
We construct the first public-key encryption scheme in the Bounded-Retrieval Model (BRM), providing security against various forms of adversarial “key leakage” attacks. In th...
Joël Alwen, Yevgeniy Dodis, Moni Naor, Gil Se...