A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2004; you can also visit the original URL.
The file type is application/pdf
.
Filters
A Constraint-Based Approach to Camera Path Planning
[chapter]
2003
Lecture Notes in Computer Science
The aim is to determine the path of a camera that verifies declarative properties on the desired image, such as location or orientation of objects on the screen at a given time. ...
The hypertube approach provides a nice global control over the camera path, as well as fine tuning in the image via cinematographic properties. ...
Property Function Description Location Frame(object, frame, time) Constrains an object in a frame. ...
doi:10.1007/3-540-37620-8_17
fatcat:5wku4lapiffbriwy2lvgolckya
Formal Specification Generation from Requirement Documents
2008
Electronical Notes in Theoretical Computer Science
) from use cases specified using the templates and CNL. ...
This paper proposes a Controlled Natural Language (CNL, a subset of English), use case specification templates, and a strategy and tool support to generate process algebraic formal models (in CSP notation ...
Acknowledgment This work has been developed in the context of a research cooperation between Motorola Inc. and CIn-UFPE. ...
doi:10.1016/j.entcs.2007.08.032
fatcat:j4mlwmmigbesndlkdtepir3i6i
Automated formal specification generation and refinement from requirement documents
2008
Journal of the Brazilian Computer Society
From these use cases a complete strategy and tools enable the generation of process algebraic formal models in the CSP notation. ...
Moreover, a refinement notion is defined to connect the generated CSP models through an event mapping relation between abstract and concrete models. ...
Acknowledgments This work has been developed in the context of a research cooperation between Motorola Inc. and CIn-UFPE. ...
doi:10.1590/s0104-65002008000100008
fatcat:4v45u3ragbbqhamrgty7f2ytsi
Automated formal specification generation and refinement from requirement documents
2008
Journal of the Brazilian Computer Society
From these use cases a complete strategy and tools enable the generation of process algebraic formal models in the CSP notation. ...
Moreover, a refinement notion is defined to connect the generated CSP models through an event mapping relation between abstract and concrete models. ...
Acknowledgments This work has been developed in the context of a research cooperation between Motorola Inc. and CIn-UFPE. ...
doi:10.1007/bf03192554
fatcat:pyln7bumjjeqjfxrk6pkc3eexq
Utility-Based Camera Assignment in a Video Network: A Game Theoretic Framework
2011
IEEE Sensors Journal
Intuitive evaluation measures are used to evaluate the performance of the system in real-world scenarios. ...
Camera utilities and person utilities are computed based on a set of user-supplied criteria, which are used in the process of developing the bargaining mechanisms. ...
Comparison with the CSP Approach The approach in [4] solves the camera assignment problem by using the constraint satisfaction approach. ...
doi:10.1109/jsen.2010.2051148
fatcat:5gzthl2efndaxgdsmud4wda5uy
Component composition errors and update atomicity: static analysis
2005
Journal of Software Maintenance and Evolution Research and Practice
Here the issue is that the classical way in the ADLs supporting behavior description, such as Wright and TRACTA, is to employ a CSP-like parallel composition which inherently yields only "successful traces ...
We discuss the problem of defining a composition operator in behavior protocols in a way which would reflect false communication of the software components being composed. ...
description language than CSP [18] . ...
doi:10.1002/smr.321
fatcat:zctqjuolfbdthi2u2cgffw2iiq
SysML Modeling for Embedded Systems Design Optimization - A Case Study
english
2015
Proceedings of the 3rd International Conference on Model-Driven Engineering and Software Development
english
The problem can be solved using a CSP solver. ...
By re-using the constraints from the SysML model, the problem can be resolved as a Constraint Satisfaction Problem (CSP), using a standard solver. ...
doi:10.5220/0005229204490457
dblp:conf/modelsward/LeserfSHC15
fatcat:dpydbrrjorgehhvepwhwmiqxyy
A High Security Buyer-Seller Watermark Protocol based on Iris Biometric
2016
Recent Advances in Electrical & Electronic Engineering (Formerly Recent Patents on Electrical & Electronic Engineering)
In addition, this paper also produces watermarking generation mechanism Chunlin Song which aims to improve the efficiency of the whole mechanism. ...
Therefore, currently, there are a number of buyer-seller watermarking protocols proposed, however, an anonymous problem and collusion problem are still unsolved completely. ...
The rest of the security issues on CSP are server availability problem, multitenant services problem, data storage problem, access control problem and so on, that are not described in this paper, the related ...
doi:10.2174/2213111607666160502121043
fatcat:ajvbgcsbt5cqlnfxzabgx5z4k4
Are We There Yet? Analyzing Architecture Description Languages for Formal Analysis, Usability, and Realizability
2013
2013 39th Euromicro Conference on Software Engineering and Advanced Applications
Research on Software Architectures has been active since the early nineties, leading to a number of different architecture description languages (ADL). ...
Given their importance in facilitating the communication of crucial system properties to different stakeholders and their analysis early on in the development of a system this is understandable. ...
ACKNOWLEDGEMENTS This work has been partially supported by the EU project FP7-257367 IoT@Work -"Internet of Things at Work". ...
doi:10.1109/seaa.2013.34
dblp:conf/euromicro/OzkayaK13
fatcat:d47irmbynfebbje4xrpuav6mb4
Multilevel Security Framework Based Resource Sharing Using Bilinear Mapping in Cloud Environment
2017
International Journal of Intelligent Engineering and Systems
In this work, the cloud ssecurity requirement has been enhanced using bilinear mapping and multilevel security framework . ...
The next thing is bilinear pairing technique, which uses the pairing techniques to achieve the secure cloud service and improve the computing utility power , store large amount of data and execute the ...
Once the CC request is received, the TPA verifies the security key and forwards the request to CSP. ...
doi:10.22266/ijies2017.0630.39
fatcat:5n7dbzbarvh3tnhpgg3yrhm5ay
Security strategies for cloud identity management - a study
2018
International Journal of Engineering & Technology
Huge amount of information stored in cloud can be accessed from anywhere, anytime on pay-per use basis. Resources in cloud should be accessed only by the authorized clients. ...
Data security and access control are the drawbacks in existing access control schemes. ...
No method exists to verify the properties of MAC policy if they are exactly communicating a model and if the policy is contented in the execution.MAC arrangement can rectify the DAC problems with the DAC ...
doi:10.14419/ijet.v7i2.10410
fatcat:ml54ydwz3rh37lqwcmjpvtkpae
Towards Efficient Video Detection Object Super-Resolution with Deep Fusion Network for Public Safety
2021
Security and Communication Networks
The object detection algorithm is used to assist police and security personnel to track suspicious objects in real time. ...
So, it is difficult to use the data sampled from the surveillance video effectively. ...
All the training and testing of the super-resolution model of the video detection object were completed on a high-performance server. is work was supported by the National Social Science Fund of China ...
doi:10.1155/2021/9999398
fatcat:uvsoflaltrdehgamgecbw7ex7q
Corporate social responsibility and the market valuation of listed real estate investment companies
2015
Zeitschrift für Immobilienökonomie
Among other aspects, the standards assist companies with accounting for greenhouse gas emissions as well as in verifying and measuring the carbon footprint of products. ...
and make use of three dummy variables. ...
The results of model (1) in table 18, table 20 and table 22 show that regardless of whether CSR83, CSR37 or CSR05 were used as a measure for CSP, the association between CSP and CFP stays invariably ...
doi:10.1365/s41056-015-0005-7
fatcat:hkddnfadzfhaxbxijsvlxly6nu
Formalising control in robust spoken dialogue systems
2005
Third IEEE International Conference on Software Engineering and Formal Methods (SEFM'05)
Specifically, we use Communicating Sequential Processes (CSP) as the basis of a new approach to the specification, design and verification of dialogue manager control. ...
Spoken Dialogue Systems (SDS) are the language architecture used to provide linguistic interaction in these applications, but they have to date been notoriously difficult to engineer in a robust and safe ...
Acknowledgements - We gratefully acknowledge the support of the Deutschen Forschungsgemeinschaft (DFG) through the SFB/TR8 Spatial Cognition -Subproject I3-SharC. ...
doi:10.1109/sefm.2005.21
dblp:conf/sefm/ShiRB05
fatcat:x4bpwtc3bvbsri7bxuxc3zdpvm
Do CSR Ratings Affect Loan Spreads? Evidence from European Syndicated Loan Market
2020
Sustainability
the relationship between CSR performance and the cost of debt financing. ...
However, the relationship between CSR ratings and loan spreads is quite complex. ...
Acknowledgments: The authors wish to acknowledge many helpful comments from Raffaele Gallo (Bank of Italy). The usual disclaimer applies. ...
doi:10.3390/su12187639
doaj:9c664300d37b4bed928fc682b7acca62
fatcat:urls4pjd3rdc5pz2egibys27re
« Previous
Showing results 1 — 15 out of 1,889 results