Filters








1,889 Hits in 6.9 sec

A Constraint-Based Approach to Camera Path Planning [chapter]

Marc Christie, Eric Languénou
2003 Lecture Notes in Computer Science  
The aim is to determine the path of a camera that verifies declarative properties on the desired image, such as location or orientation of objects on the screen at a given time.  ...  The hypertube approach provides a nice global control over the camera path, as well as fine tuning in the image via cinematographic properties.  ...  Property Function Description Location Frame(object, frame, time) Constrains an object in a frame.  ... 
doi:10.1007/3-540-37620-8_17 fatcat:5wku4lapiffbriwy2lvgolckya

Formal Specification Generation from Requirement Documents

Gustavo Cabral, Augusto Sampaio
2008 Electronical Notes in Theoretical Computer Science  
) from use cases specified using the templates and CNL.  ...  This paper proposes a Controlled Natural Language (CNL, a subset of English), use case specification templates, and a strategy and tool support to generate process algebraic formal models (in CSP notation  ...  Acknowledgment This work has been developed in the context of a research cooperation between Motorola Inc. and CIn-UFPE.  ... 
doi:10.1016/j.entcs.2007.08.032 fatcat:j4mlwmmigbesndlkdtepir3i6i

Automated formal specification generation and refinement from requirement documents

Gustavo Cabral, Augusto Sampaio
2008 Journal of the Brazilian Computer Society  
From these use cases a complete strategy and tools enable the generation of process algebraic formal models in the CSP notation.  ...  Moreover, a refinement notion is defined to connect the generated CSP models through an event mapping relation between abstract and concrete models.  ...  Acknowledgments This work has been developed in the context of a research cooperation between Motorola Inc. and CIn-UFPE.  ... 
doi:10.1590/s0104-65002008000100008 fatcat:4v45u3ragbbqhamrgty7f2ytsi

Automated formal specification generation and refinement from requirement documents

Gustavo Cabral, Augusto Sampaio
2008 Journal of the Brazilian Computer Society  
From these use cases a complete strategy and tools enable the generation of process algebraic formal models in the CSP notation.  ...  Moreover, a refinement notion is defined to connect the generated CSP models through an event mapping relation between abstract and concrete models.  ...  Acknowledgments This work has been developed in the context of a research cooperation between Motorola Inc. and CIn-UFPE.  ... 
doi:10.1007/bf03192554 fatcat:pyln7bumjjeqjfxrk6pkc3eexq

Utility-Based Camera Assignment in a Video Network: A Game Theoretic Framework

Yiming Li, Bir Bhanu
2011 IEEE Sensors Journal  
Intuitive evaluation measures are used to evaluate the performance of the system in real-world scenarios.  ...  Camera utilities and person utilities are computed based on a set of user-supplied criteria, which are used in the process of developing the bargaining mechanisms.  ...  Comparison with the CSP Approach The approach in [4] solves the camera assignment problem by using the constraint satisfaction approach.  ... 
doi:10.1109/jsen.2010.2051148 fatcat:5gzthl2efndaxgdsmud4wda5uy

Component composition errors and update atomicity: static analysis

J. Adamek, F. Plasil
2005 Journal of Software Maintenance and Evolution Research and Practice  
Here the issue is that the classical way in the ADLs supporting behavior description, such as Wright and TRACTA, is to employ a CSP-like parallel composition which inherently yields only "successful traces  ...  We discuss the problem of defining a composition operator in behavior protocols in a way which would reflect false communication of the software components being composed.  ...  description language than CSP [18] .  ... 
doi:10.1002/smr.321 fatcat:zctqjuolfbdthi2u2cgffw2iiq

SysML Modeling for Embedded Systems Design Optimization - A Case Study
english

Patrick Leserf, Pierre de Saqui-Sannes, Jérôme Hugues, Khaled Chaaban
2015 Proceedings of the 3rd International Conference on Model-Driven Engineering and Software Development  
The problem can be solved using a CSP solver.  ...  By re-using the constraints from the SysML model, the problem can be resolved as a Constraint Satisfaction Problem (CSP), using a standard solver.  ... 
doi:10.5220/0005229204490457 dblp:conf/modelsward/LeserfSHC15 fatcat:dpydbrrjorgehhvepwhwmiqxyy

A High Security Buyer-Seller Watermark Protocol based on Iris Biometric

Chunlin Song, Jie Sang, Bo Zhou
2016 Recent Advances in Electrical & Electronic Engineering (Formerly Recent Patents on Electrical & Electronic Engineering)  
In addition, this paper also produces watermarking generation mechanism Chunlin Song which aims to improve the efficiency of the whole mechanism.  ...  Therefore, currently, there are a number of buyer-seller watermarking protocols proposed, however, an anonymous problem and collusion problem are still unsolved completely.  ...  The rest of the security issues on CSP are server availability problem, multitenant services problem, data storage problem, access control problem and so on, that are not described in this paper, the related  ... 
doi:10.2174/2213111607666160502121043 fatcat:ajvbgcsbt5cqlnfxzabgx5z4k4

Are We There Yet? Analyzing Architecture Description Languages for Formal Analysis, Usability, and Realizability

Mert Ozkaya, Christos Kloukinas
2013 2013 39th Euromicro Conference on Software Engineering and Advanced Applications  
Research on Software Architectures has been active since the early nineties, leading to a number of different architecture description languages (ADL).  ...  Given their importance in facilitating the communication of crucial system properties to different stakeholders and their analysis early on in the development of a system this is understandable.  ...  ACKNOWLEDGEMENTS This work has been partially supported by the EU project FP7-257367 IoT@Work -"Internet of Things at Work".  ... 
doi:10.1109/seaa.2013.34 dblp:conf/euromicro/OzkayaK13 fatcat:d47irmbynfebbje4xrpuav6mb4

Multilevel Security Framework Based Resource Sharing Using Bilinear Mapping in Cloud Environment

Balamanigandan Ramachandran, Kamalraj Subramaniam
2017 International Journal of Intelligent Engineering and Systems  
In this work, the cloud ssecurity requirement has been enhanced using bilinear mapping and multilevel security framework .  ...  The next thing is bilinear pairing technique, which uses the pairing techniques to achieve the secure cloud service and improve the computing utility power , store large amount of data and execute the  ...  Once the CC request is received, the TPA verifies the security key and forwards the request to CSP.  ... 
doi:10.22266/ijies2017.0630.39 fatcat:5n7dbzbarvh3tnhpgg3yrhm5ay

Security strategies for cloud identity management - a study

Anilkumar Chunduru, Sumathy S
2018 International Journal of Engineering & Technology  
Huge amount of information stored in cloud can be accessed from anywhere, anytime on pay-per use basis. Resources in cloud should be accessed only by the authorized clients.  ...  Data security and access control are the drawbacks in existing access control schemes.  ...  No method exists to verify the properties of MAC policy if they are exactly communicating a model and if the policy is contented in the execution.MAC arrangement can rectify the DAC problems with the DAC  ... 
doi:10.14419/ijet.v7i2.10410 fatcat:ml54ydwz3rh37lqwcmjpvtkpae

Towards Efficient Video Detection Object Super-Resolution with Deep Fusion Network for Public Safety

Sheng Ren, Jianqi Li, Tianyi Tu, Yibo Peng, Jian Jiang, David Megías
2021 Security and Communication Networks  
The object detection algorithm is used to assist police and security personnel to track suspicious objects in real time.  ...  So, it is difficult to use the data sampled from the surveillance video effectively.  ...  All the training and testing of the super-resolution model of the video detection object were completed on a high-performance server. is work was supported by the National Social Science Fund of China  ... 
doi:10.1155/2021/9999398 fatcat:uvsoflaltrdehgamgecbw7ex7q

Corporate social responsibility and the market valuation of listed real estate investment companies

Alexander Nikolaus Kerscher, Wolfgang Schäfers
2015 Zeitschrift für Immobilienökonomie  
Among other aspects, the standards assist companies with accounting for greenhouse gas emissions as well as in verifying and measuring the carbon footprint of products.  ...  and make use of three dummy variables.  ...  The results of model (1) in table 18, table 20 and table 22 show that regardless of whether CSR83, CSR37 or CSR05 were used as a measure for CSP, the association between CSP and CFP stays invariably  ... 
doi:10.1365/s41056-015-0005-7 fatcat:hkddnfadzfhaxbxijsvlxly6nu

Formalising control in robust spoken dialogue systems

H. Shi, R.J. Ross, J. Bateman
2005 Third IEEE International Conference on Software Engineering and Formal Methods (SEFM'05)  
Specifically, we use Communicating Sequential Processes (CSP) as the basis of a new approach to the specification, design and verification of dialogue manager control.  ...  Spoken Dialogue Systems (SDS) are the language architecture used to provide linguistic interaction in these applications, but they have to date been notoriously difficult to engineer in a robust and safe  ...  Acknowledgements - We gratefully acknowledge the support of the Deutschen Forschungsgemeinschaft (DFG) through the SFB/TR8 Spatial Cognition -Subproject I3-SharC.  ... 
doi:10.1109/sefm.2005.21 dblp:conf/sefm/ShiRB05 fatcat:x4bpwtc3bvbsri7bxuxc3zdpvm

Do CSR Ratings Affect Loan Spreads? Evidence from European Syndicated Loan Market

Danilo Drago, Concetta Carnevale
2020 Sustainability  
the relationship between CSR performance and the cost of debt financing.  ...  However, the relationship between CSR ratings and loan spreads is quite complex.  ...  Acknowledgments: The authors wish to acknowledge many helpful comments from Raffaele Gallo (Bank of Italy). The usual disclaimer applies.  ... 
doi:10.3390/su12187639 doaj:9c664300d37b4bed928fc682b7acca62 fatcat:urls4pjd3rdc5pz2egibys27re
« Previous Showing results 1 — 15 out of 1,889 results