Sciweavers

2200 search results - page 149 / 440
» The Generalized Pignistic Transformation
Sort
View
ACSC
2007
IEEE
14 years 5 months ago
From Graphs to Euclidean Virtual Worlds: Visualization of 3D Electronic Institutions
In this paper we propose an algorithm for automatic transformation of a graph into a 3D Virtual World and its Euclidean map, using the rectangular dualization technique. The nodes...
Sara Drago, Anton Bogdanovych, Massimo Ancona, Sim...
RULEML
2007
Springer
14 years 4 months ago
Specifying Process-Aware Access Control Rules in SBVR
Abstract. Access control is an important aspect of regulatory compliance. Therefore, access control specifications must be process-aware in that they can refer to an underlying bu...
Stijn Goedertier, Christophe Mues, Jan Vanthienen
IJCNN
2006
IEEE
14 years 4 months ago
Nonlinear Component Analysis Based on Correntropy
Abstract— In this paper, we propose a new nonlinear principal component analysis based on a generalized correlation function which we call correntropy. The data is nonlinearly tr...
Jian-Wu Xu, Puskal P. Pokharel, António R. ...
HICSS
2005
IEEE
127views Biometrics» more  HICSS 2005»
14 years 4 months ago
Enterprise Architecture Analysis with XML
This paper shows how XML can be used for static and dynamic analysis of architectures. Our analysis is based on the distinction between symbolic and semantic models of architectur...
Frank S. de Boer, Marcello M. Bonsangue, Joost Jac...
ICMCS
2005
IEEE
107views Multimedia» more  ICMCS 2005»
14 years 4 months ago
Evaluating keypoint methods for content-based copyright protection of digital images
This paper evaluates the effectiveness of keypoint methods for content-based protection of digital images. These methods identify a set of “distinctive” regions (termed keypoi...
Larry Huston, Rahul Sukthankar, Yan Ke