ViBe: a powerful random technique to estimate the background in video sequences

O Barnich… - 2009 IEEE international …, 2009 - ieeexplore.ieee.org
Background subtraction is a crucial step in many automatic video content analysis
applications. While numerous acceptable techniques have been proposed so far for …

Semantic Web languages for policy representation and reasoning: A comparison of KAoS, Rei, and Ponder

G Tonti, JM Bradshaw, R Jeffers, R Montanari… - The Semantic Web …, 2003 - Springer
Policies are being increasingly used for automated system management and controlling the
behavior of complex systems. The use of policies allows administrators to modify system …

Using event calculus to formalise policy specification and analysis

AK Bandara, EC Lupu, A Russo - Proceedings POLICY 2003 …, 2003 - ieeexplore.ieee.org
As the interest in using policy-based approaches for systems management grows, it is
becoming increasingly important to develop methods for performing analysis and refinement …

A goal-based approach to policy refinement

AK Bandara, EC Lupu, J Moffett… - Proceedings. Fifth IEEE …, 2004 - ieeexplore.ieee.org
As the interest in using policy-based approaches for systems management grows, it is
becoming increasingly important to develop methods for performing analysis and refinement …

An adaptive policy-based framework for network services management

L Lymberopoulos, E Lupu, M Sloman - Journal of Network and systems …, 2003 - Springer
This paper presents a framework for specifying policies for the management of network
services. Although policy-based management has been the subject of considerable …

A model of visual organization for the game of go

AL Zobrist - Proceedings of the May 14-16, 1969, spring joint …, 1969 - dl.acm.org
No successful GO-playing program has appeared in the literature, although Remus used GO
as the subject of a machine learning study, and Thorp and Walden have considered some of …

AMUSE: autonomic management of ubiquitous e‐Health systems

E Lupu, N Dulay, M Sloman, J Sventek… - Concurrency and …, 2008 - Wiley Online Library
Future e‐Health systems will consist of low‐power on‐body wireless sensors attached to
mobile users that interact with an ubiquitous computing environment to monitor the health …

An aspect-based approach to modeling access control concerns

I Ray, R France, N Li, G Georg - Information and Software Technology, 2004 - Elsevier
Specifying, enforcing and evolving access control policies is essential to prevent security
breaches and unavailability of resources. These access control design concerns impose …

Using linear temporal model checking for goal-oriented policy refinement frameworks

J Rubio-Loyola, J Serrat… - … on Policies for …, 2005 - ieeexplore.ieee.org
Policy refinement is meant to derive lower-level policies from higher-level ones so that these
more specific policies are better suited for use in different execution environments. Although …

[PDF][PDF] Access control policies: Modeling and validation

M Mankai, L Logrippo - 5th NOTERE Conference (Nouvelles …, 2005 - eecs.uottawa.ca
Access control requires authorization rules and constraints. To express access control
policies, several languages, such as XACML, EPAL or PONDER, are used. These …