Sciweavers

1795 search results - page 333 / 359
» Security Models and Information Flow
Sort
View
161
Voted
WECWIS
2003
IEEE
205views ECommerce» more  WECWIS 2003»
15 years 9 months ago
Beyond "web of trust": Enabling P2P E-commerce
The huge success of eBay has proven the demand for customer-to-customer (C2C) electronic commerce. eBay is a centralized infrastructure with all its scalability problems (network ...
Anwitaman Datta, Manfred Hauswirth, Karl Aberer
136
Voted
KDD
2005
ACM
137views Data Mining» more  KDD 2005»
16 years 4 months ago
A generalized framework for mining spatio-temporal patterns in scientific data
In this paper, we present a general framework to discover spatial associations and spatio-temporal episodes for scientific datasets. In contrast to previous work in this area, fea...
Hui Yang, Srinivasan Parthasarathy, Sameep Mehta
138
Voted
CAISE
2004
Springer
15 years 9 months ago
Network-based Business Process Management: a Discussion on Embedding Business Logic in Communications Networks
Advanced Business Process Management (BPM) tools enable the decomposition of previously integrated and often ill-defined processes into reusable process modules. These process modu...
Louis-François Pau, Peter H. M. Vervest
136
Voted
NN
2008
Springer
150views Neural Networks» more  NN 2008»
15 years 3 months ago
Neural network based pattern matching and spike detection tools and services - in the CARMEN neuroinformatics project
In the study of information flow in the nervous system, component processes can be investigated using a range of electrophysiological and imaging techniques. Although data is diff...
Martyn Fletcher, Bojian Liang, Leslie Smith, Alast...
150
Voted
CVPR
2006
IEEE
16 years 5 months ago
Bilayer Segmentation of Live Video
This paper presents an algorithm capable of real-time separation of foreground from background in monocular video sequences. Automatic segmentation of layers from colour/contrast ...
Antonio Criminisi, Geoffrey Cross, Andrew Blake, V...