Sciweavers

5544 search results - page 53 / 1109
» Three Inadequate Models
Sort
View
SP
2010
IEEE
210views Security Privacy» more  SP 2010»
13 years 11 months ago
Reconciling Belief and Vulnerability in Information Flow
Abstract—Belief and vulnerability have been proposed recently to quantify information flow in security systems. Both concepts stand as alternatives to the traditional approaches...
Sardaouna Hamadou, Vladimiro Sassone, Catuscia Pal...
ICIP
2001
IEEE
14 years 9 months ago
(Automatic) target detection in synthetic aperture radar imagery via terrain recognition
Surveillance of large areas of the Earths surface is often undertaken with low resolution synthetic aperture radar (SAR) imagery from either a satellite or a plane. There is a nee...
Rupert Paget, John Homer, Donald Crisp
COCOON
2005
Springer
14 years 1 months ago
Construction of Scale-Free Networks with Partial Information
It has recently been observed that the node degrees of many real-world large-scale networks, such as the Internet and the Web, follow a power law distributions. Since the classical...
Jianyang Zeng, Wen-Jing Hsu, Suiping Zhou
SEMWEB
2005
Springer
14 years 1 months ago
On the Properties of Metamodeling in OWL
A common practice in conceptual modeling is to separate the conceptual from the data model. Although very intuitive, this approach is inadequate for many complex domains, in which...
Boris Motik
PET
2004
Springer
14 years 1 months ago
A Formal Privacy System and Its Application to Location Based Services
There are a variety of well-known models for access control developed for purposes like formally modeling the access rights on files, databases, and web resources. However, the ex...
Carl A. Gunter, Michael J. May, Stuart G. Stubbleb...