ViBe: a powerful random technique to estimate the background in video sequences
O Barnich… - 2009 IEEE international …, 2009 - ieeexplore.ieee.org
Background subtraction is a crucial step in many automatic video content analysis
applications. While numerous acceptable techniques have been proposed so far for …
applications. While numerous acceptable techniques have been proposed so far for …
Semantic Web languages for policy representation and reasoning: A comparison of KAoS, Rei, and Ponder
Policies are being increasingly used for automated system management and controlling the
behavior of complex systems. The use of policies allows administrators to modify system …
behavior of complex systems. The use of policies allows administrators to modify system …
Using event calculus to formalise policy specification and analysis
As the interest in using policy-based approaches for systems management grows, it is
becoming increasingly important to develop methods for performing analysis and refinement …
becoming increasingly important to develop methods for performing analysis and refinement …
A goal-based approach to policy refinement
As the interest in using policy-based approaches for systems management grows, it is
becoming increasingly important to develop methods for performing analysis and refinement …
becoming increasingly important to develop methods for performing analysis and refinement …
An adaptive policy-based framework for network services management
This paper presents a framework for specifying policies for the management of network
services. Although policy-based management has been the subject of considerable …
services. Although policy-based management has been the subject of considerable …
A model of visual organization for the game of go
AL Zobrist - Proceedings of the May 14-16, 1969, spring joint …, 1969 - dl.acm.org
No successful GO-playing program has appeared in the literature, although Remus used GO
as the subject of a machine learning study, and Thorp and Walden have considered some of …
as the subject of a machine learning study, and Thorp and Walden have considered some of …
AMUSE: autonomic management of ubiquitous e‐Health systems
Future e‐Health systems will consist of low‐power on‐body wireless sensors attached to
mobile users that interact with an ubiquitous computing environment to monitor the health …
mobile users that interact with an ubiquitous computing environment to monitor the health …
An aspect-based approach to modeling access control concerns
Specifying, enforcing and evolving access control policies is essential to prevent security
breaches and unavailability of resources. These access control design concerns impose …
breaches and unavailability of resources. These access control design concerns impose …
Using linear temporal model checking for goal-oriented policy refinement frameworks
Policy refinement is meant to derive lower-level policies from higher-level ones so that these
more specific policies are better suited for use in different execution environments. Although …
more specific policies are better suited for use in different execution environments. Although …
[PDF][PDF] Access control policies: Modeling and validation
M Mankai, L Logrippo - 5th NOTERE Conference (Nouvelles …, 2005 - eecs.uottawa.ca
Access control requires authorization rules and constraints. To express access control
policies, several languages, such as XACML, EPAL or PONDER, are used. These …
policies, several languages, such as XACML, EPAL or PONDER, are used. These …