Sciweavers

139 search results - page 5 / 28
» Specific features in automatic processing of the formations ...
Sort
View
IFIP
2009
Springer
13 years 5 months ago
Model Checking of Security-Sensitive Business Processes
Security-sensitive business processes are business processes that must comply with security requirements (e.g. authorization constraints). In previous works it has been shown that ...
Alessandro Armando, Serena Elisa Ponta
IAAI
2003
13 years 9 months ago
Searching for Hidden Messages: Automatic Detection of Steganography
Steganography is the field of hiding messages in apparently innocuous media (e.g. images), and steganalysis is the field of detecting these covert messages. Almost all steganalysi...
George Berg, Ian Davidson, Ming-Yuan Duan, Goutam ...
CVPR
2004
IEEE
14 years 9 months ago
Asymmetrically Boosted HMM for Speech Reading
Speech reading, also known as lip reading, is aimed at extracting visual cues of lip and facial movements to aid in recognition of speech. The main hurdle for speech reading is th...
Pei Yin, Irfan A. Essa, James M. Rehg
FMSD
2006
119views more  FMSD 2006»
13 years 7 months ago
Feature interaction detection by pairwise analysis of LTL properties - A case study
A Promela specification and a set of temporal properties are developed for a basic call service with a number of features. The properties are expressed in the logic LTL. Interactio...
Muffy Calder, Alice Miller
INTERACTION
2009
ACM
14 years 2 months ago
DTD2OWL: automatic transforming XML documents into OWL ontology
DTD and its instance have been considered the standard for data representation and information exchange format on the current web. However, when coming to the next generation of w...
Pham Thi Thu Thuy, Young-Koo Lee, Sungyoung Lee