Sciweavers

1735 search results - page 257 / 347
» Using UML for Business Object Based Systems Modeling
Sort
View
ICICS
2005
Springer
14 years 2 months ago
Network Vulnerability Analysis Through Vulnerability Take-Grant Model (VTG)
Modeling and analysis of information system vulnerabilities helps us to predict possible attacks to networks using the network configuration and vulnerabilities information. As a f...
Hamid Reza Shahriari, Reza Sadoddin, Rasool Jalili...
BPM
2006
Springer
166views Business» more  BPM 2006»
14 years 27 days ago
Process Mining by Measuring Process Block Similarity
Mining, discovering, and integrating process-oriented services has attracted growing attention in the recent year. Workflow precedence graph and workflow block structures are two i...
Joonsoo Bae, James Caverlee, Ling Liu, Hua Yan
MVA
2010
254views Computer Vision» more  MVA 2010»
13 years 7 months ago
Gamma/X-ray linear pushbroom stereo for 3D cargo inspection
For evaluating the contents of trucks, containers, cargo, and passenger vehicles by a non-intrusive gamma-ray or X-ray imaging system to determine the possible presence of contrab...
Zhigang Zhu, Yu-Chi Hu, Li Zhao
WWW
2005
ACM
14 years 9 months ago
Designing learning services: from content-based to activity-based learning systems
The need for e-learning systems that support a diverse set of pedagogical requirements has been identified as an important issue in web-based education. Until now, significant R&a...
Pythagoras Karampiperis, Demetrios G. Sampson
CVIU
2008
203views more  CVIU 2008»
13 years 9 months ago
A computer vision model for visual-object-based attention and eye movements
This paper presents a new computational framework for modelling visual-object based attention and attention-driven eye movements within an integrated system in a biologically insp...
Yaoru Sun, Robert B. Fisher, Fang Wang, Herman Mar...