Sciweavers

2838 search results - page 183 / 568
» Verifying Controlled Components
Sort
View
ICPR
2004
IEEE
14 years 12 months ago
Developing Assistant Tools for Geometric Camera Calibration: Assessing the Quality of Input Images
This paper proposes two indicators for predicting the quality of camera model parameters from a set of input images. The first indicator is based on the acutance. It can quickly i...
Jean-Nicolas Ouellet, Patrick Hébert
CCS
2010
ACM
14 years 5 months ago
Cryptographic role-based security mechanisms based on role-key hierarchy
Even though role-based access control (RBAC) can tremendously help us minimize the complexity in administering users, it is still needed to realize the notion of roles at the reso...
Yan Zhu, Gail-Joon Ahn, Hongxin Hu, Huaixi Wang
IAT
2009
IEEE
14 years 5 months ago
Agent-Based Security System for User Verification
—We present a security system consisting of an arbitrary number of entries, sensors and agents. The intelligent integrated system is based on user modeling, i.e. models of their ...
Erik Dovgan, Bostjan Kaluza, Tea Tusar, Matjaz Gam...
RP
2009
Springer
136views Control Systems» more  RP 2009»
14 years 5 months ago
Probabilistic Model Checking of Biological Systems with Uncertain Kinetic Rates
We present an abstraction of the probabilistic semantics of Multiset Rewriting to formally express systems of reactions with uncertain kinetic rates. This allows biological systems...
Roberto Barbuti, Francesca Levi, Paolo Milazzo, Gu...
WOWMOM
2009
ACM
143views Multimedia» more  WOWMOM 2009»
14 years 5 months ago
Enhanced Ripple (E-Ripple) protocol for chain-based multihop wireless networks
It has been shown that IEEE 802.11 DCF medium access control (MAC) protocol may not be suitable for multihop wireless networks due to its relatively low throughput and severely un...
Quang Vu Nguyen, Ray-Guang Cheng