Sciweavers

1795 search results - page 57 / 359
» Security Models and Information Flow
Sort
View
KDD
2007
ACM
136views Data Mining» more  KDD 2007»
14 years 10 months ago
Information genealogy: uncovering the flow of ideas in non-hyperlinked document databases
We now have incrementally-grown databases of text documents ranging back for over a decade in areas ranging from personal email, to news-articles and conference proceedings. While...
Benyah Shaparenko, Thorsten Joachims
INFORMATICALT
2008
115views more  INFORMATICALT 2008»
13 years 9 months ago
A Fine-Grained Access Control System Combining MAC and RBACK Models for XML
In this paper, we present a novel fine-grained access control system for applications where the information flow is critical; the confidentiality of the data is essential and there...
Mustafa M. Kocatürk, Taflan I. Gündem
IBPRIA
2003
Springer
14 years 2 months ago
Probabilistic Observation Models for Tracking Based on Optical Flow
In this paper, we present two new observation models based on optical flow information to track objects using particle filter algorithms. Although optical flow information enabl...
Manuel J. Lucena, José M. Fuertes, Nicolas ...
IEEECIT
2006
IEEE
14 years 3 months ago
An Efficient LU Decomposition-based Key Pre-distribution Scheme for Ensuring Security in Wireless Sensor Networks
In this paper we propose an improved and efficient key pre-distribution scheme for wireless sensor networks. Our scheme significantly increases the storage efficiency and security...
Al-Sakib Khan Pathan, Tran Thanh Dai, Choong Seon ...