Sciweavers

2259 search results - page 372 / 452
» Separation and information hiding
Sort
View
IWSEC
2010
Springer
13 years 9 months ago
Optimal Adversary Behavior for the Serial Model of Financial Attack Trees
Abstract. Attack tree analysis is used to estimate different parameters of general security threats based on information available for atomic subthreats. We focus on estimating the...
Margus Niitsoo
PRICAI
2010
Springer
13 years 9 months ago
Multi-manifold Clustering
Manifold clustering, which regards clusters as groups of points around compact manifolds, has been realized as a promising generalization of traditional clustering. A number of lin...
Yong Wang, Yuan Jiang, Yi Wu, Zhi-Hua Zhou
PVLDB
2010
168views more  PVLDB 2010»
13 years 9 months ago
Transforming XML Documents as Schemas Evolve
Database systems often use XML schema to describe the format of valid XML documents. Usually, this format is determined when the system is designed. Sometimes, in an already funct...
Jarek Gryz, Marcin Kwietniewski, Stephanie Hazlewo...
SIVP
2010
164views more  SIVP 2010»
13 years 9 months ago
Adaptive and personalized multimedia content delivery for disabled users in Internet TV
This paper aims at the delivery of adaptive and personalized multimedia content in interactive IPTV environments, using programmable IP services through the MPEG-21 standard, suppo...
Ioannis Anagnostopoulos, Christos-Nikolaos Anagnos...
VR
2010
IEEE
235views Virtual Reality» more  VR 2010»
13 years 9 months ago
VirtualizeMe: Real-time avatar creation for Tele-Immersion environments
VirtualizeMe introduces a new design for a fully immersive TeleImmersion system for remote collaboration and virtual world interaction. This system introduces a new avatar creatio...
Daniel Knoblauch, Pau Moreno Font, Falko Kuester