Sciweavers

545 search results - page 70 / 109
» expert 2008
Sort
View
JCP
2008
116views more  JCP 2008»
13 years 7 months ago
Formal Verification and Visualization of Security Policies
Verified and validated security policies are essential components of high assurance computer systems. The design and implementation of security policies are fundamental processes i...
Luay A. Wahsheh, Daniel Conte de Leon, Jim Alves-F...
JEI
2008
139views more  JEI 2008»
13 years 7 months ago
Tessella-oriented segmentation and guidelines estimation of ancient mosaic images
Automatic segmentation and analysis of ancient mosaic images can help archaeologists and experts build digital collections and automatically compare mosaics by means of image datab...
Lamia Benyoussef, Stéphane Derrode
JUCS
2008
167views more  JUCS 2008»
13 years 7 months ago
A Generic Architecture for the Conversion of Document Collections into Semantically Annotated Digital Archives
: Mass digitization of document collections with further processing and semantic annotation is an increasing activity among libraries and archives at large for preservation, browsi...
Josep Lladós, Dimosthenis Karatzas, Joan Ma...
JUCS
2008
129views more  JUCS 2008»
13 years 7 months ago
Easing the Smart Home: Semi-automatic Adaptation in Perceptive Environments
: This paper analyses the requirements of automation and adaptation in the so called perceptive environments. These environments are places with the ability of perceiving the conte...
Manuel García-Herranz, Pablo A. Haya, Abrah...
JUCS
2008
187views more  JUCS 2008»
13 years 7 months ago
Semantic Information in Medical Information Systems: Utilization of Text Mining Techniques to Analyze Medical Diagnoses
: Most information in Hospitals is still only available in text format and the amount of this data is immensely increasing. Consequently, text mining is an essential area of medica...
Andreas Holzinger, Regina Geierhofer, Felix Mö...