Sciweavers

2740 search results - page 192 / 548
» Typing the Specialization Interface
Sort
View
WWW
2001
ACM
16 years 4 months ago
Batch rekeying for secure group communications
Many emerging web and Internet applications are based on a group communications model. Thus, securing group communications is an important Internet design issue. The key graph app...
Xiaozhou (Steve) Li, Yang Richard Yang, Mohamed G....
AVSS
2009
IEEE
15 years 10 months ago
An Ontology for Event Detection and its Application in Surveillance Video
In this paper, we propose an ontology for representing the prior knowledge related to video event analysis. It is composed of two types of knowledge related to the application dom...
Juan Carlos San Miguel, José María M...
ROMAN
2007
IEEE
127views Robotics» more  ROMAN 2007»
15 years 10 months ago
Incremental on-line hierarchical clustering of whole body motion patterns
Abstract— This paper describes a novel algorithm for autonomous and incremental learning of motion pattern primitives by observation of human motion. Human motion patterns are ed...
Dana Kulic, Wataru Takano, Yoshihiko Nakamura
BTW
2007
Springer
123views Database» more  BTW 2007»
15 years 10 months ago
Data Provenance: A Categorization of Existing Approaches
: In many application areas like e-science and data-warehousing detailed information about the origin of data is required. This kind of information is often referred to as data pro...
Boris Glavic, Klaus R. Dittrich
ESOP
2007
Springer
15 years 10 months ago
On the Relationship Between Concurrent Separation Logic and Assume-Guarantee Reasoning
We study the relationship between Concurrent Separation Logic (CSL) and the assume-guarantee (A-G) method (a.k.a. rely-guarantee method). We show in three steps that CSL can be tre...
Xinyu Feng, Rodrigo Ferreira, Zhong Shao