Collaborative access control is receiving growing attention in both military and commercial areas due to an urgent need to protect confidential resources and sensitive *** access control means that multiple subjects s...
详细信息
Collaborative access control is receiving growing attention in both military and commercial areas due to an urgent need to protect confidential resources and sensitive *** access control means that multiple subjects should participate to make access control decisions to prevent fraud or the abuse of *** approaches to access control cannot satisfy the requirements of collaborative access *** address this concern,we propose an authorization model for collaborative access *** central notions of the model are collaborative permission,collaboration constraint,and collaborative authorization policy,which make it possible to define the collaboration among multiple subjects involved in gaining a *** implementation architecture of the model is also ***,we present effective conflict detection and resolution methods for maintaining the consistency of collaborative authorization policies.
We present a new combined cellular automaton (CA) model for one-lane traffic flow. In this model, we consider the driver prejudgment according to the state (velocity and brake light) of the leading vehicle. We also co...
详细信息
In this work, we present a heuristic search technique (Contract Search) which can be automatically adapted for a specified node expansion limitation. We analyze the node expansion properties of best first search and p...
详细信息
ISBN:
(纸本)9781607506058
In this work, we present a heuristic search technique (Contract Search) which can be automatically adapted for a specified node expansion limitation. We analyze the node expansion properties of best first search and propose a probabilistic model (rank profile) to characterize heuristic search under restricted expansions. We identify the basic properties of the rank profile and establish its relation with the search space configuration. In Contract Search, we use the rank profile model to formulate an optimal strategy to choose level dependent restriction bounds maximizing the probability of obtaining the goal node under the specified contract. Experimental comparison with anytime search techniques like ARA* and beam search shows that Contract Search outperforms these techniques over a range of constraint specifications.
A new quality measure is proposed for evaluating the performance of segmentation algorithms. This discrepancy method is based on object-by-object comparison of a segmented image (machine segmentation) versus ground-tr...
详细信息
ISBN:
(纸本)9780889868243
A new quality measure is proposed for evaluating the performance of segmentation algorithms. This discrepancy method is based on object-by-object comparison of a segmented image (machine segmentation) versus ground-truth segmentation (reference image). The error measure we propose offers two main advantages compared to other quality measures. The first advantage to mention is the use of alternative methods in computing the distance from the contour of the segmented object to the reference one. This method takes into consideration the interior of the object and eliminates the inconveniences that appear in the case of the concave objects. The second improvement comes from adding a weighted shape fitting score: the score of the segmented contour is enhanced by a factor which indicates the similarity between these two curves.
Automatic image annotation is an active topic and difficult task in computer vision domain, which has attracted more and more researchers' attention. Many approaches have been proposed to automatically annotate im...
详细信息
We consider the generalized minimum edge-biconnected network problem where the nodes of a graph are partitioned into clusters and exactly one node from each cluster is required to be connected in an edge-biconnected w...
详细信息
This paper provides a classification of perceptual issues in augmented reality, created with a visual processing and interpretation pipeline in mind. We organize issues into ones related to the environment, capturing,...
详细信息
This paper describes a new embedded system, called iFall, for the detection of unexpected falls for elderly people. In combination with a new sensors system and the monitoring of its own rotation, iFail is able to det...
详细信息
Structural health monitoring systems allow a continuous surveillance of the structural integrity of operational systems. As a result, it is possible to reduce time and costs for maintenance without decreasing the leve...
Structural health monitoring systems allow a continuous surveillance of the structural integrity of operational systems. As a result, it is possible to reduce time and costs for maintenance without decreasing the level of safety. In this paper, an integrated simulation and visualization environment is presented that enables a detailed study of Lamb wave propagation in isotropic and anisotropic materials. Thus, valuable information about the nature of Lamb wave propagation and its interaction with structural defects become available. The well-known spectral finite element method is implemented to enable a time-efficient calculation of the wave propagation problem. The results are displayed in an interactive visualization framework accounting for the human perception that is much more sensitive to motion than to changes in color. In addition, measurements have been conducted experimentally to record the full out-of-plane wave-field using a Laser-Doppler vibrometry setup. An aluminum structure with two synthetic cuts has been investigated, where the elongated defects have a different orientation with respect to the piezoelectric actuator. The resulting wave-field is also displayed interactively showing that the scattered wave-field at the defect is highly directional.
暂无评论