Sciweavers

1795 search results - page 291 / 359
» Security Models and Information Flow
Sort
View
CVPR
2008
IEEE
14 years 11 months ago
Extracting a fluid dynamic texture and the background from video
Given the video of a still background occluded by a fluid dynamic texture (FDT), this paper addresses the problem of separating the video sequence into its two constituent layers....
Bernard Ghanem, Narendra Ahuja
WOSP
2005
ACM
14 years 2 months ago
From UML to LQN by XML algebra-based model transformations
The change of focus from code to models promoted by OMG's Model Driven Development raises the need for verification of nonfunctional characteristics of UML models, such as pe...
Gordon Ping Gu, Dorina C. Petriu
PDPTA
2004
13 years 10 months ago
Semantic Extensions for the Virtual Enterprise's Grid Infastructure
Construction activities take place in what can be called a dynamic virtual organization (VO). VOs require a secure, reliable, scalable information infrastructure that allows collab...
Ziga Turk, Vlado Stankovski, Matevz Dolenc, Tomo C...
KES
2008
Springer
13 years 7 months ago
Fast Cryptographic Privacy Preserving Association Rules Mining on Distributed Homogenous Data Base
Privacy is one of the most important properties of an information system must satisfy. In which systems the need to share information among different, not trusted entities, the pro...
Mahmoud Hussein, Ashraf El-Sisi, Nabil A. Ismail
GIS
2005
ACM
14 years 10 months ago
Contraflow network reconfiguration for evacuation planning: a summary of results
Contraflow, or lane reversal, is a way of increasing outbound capacity of a real network by reversing the direction of inbound roads during evacuations. The contraflow is consider...
Sangho Kim, Shashi Shekhar