Sciweavers

2002 search results - page 400 / 401
» An Approach for Assessment of Reliability of the System Usin...
Sort
View
DBSEC
2004
170views Database» more  DBSEC 2004»
13 years 7 months ago
RBAC/MAC Security Analysis and Design for UML
In software construction, analysis investigates the boundary of a system (scope and requirements), its usage and access, and from a security perspective, who needs access to what ...
Thuong Doan, Steven A. Demurjian, Charles E. Phill...
ETRA
2010
ACM
197views Biometrics» more  ETRA 2010»
14 years 26 days ago
Image ranking with implicit feedback from eye movements
In order to help users navigate an image search system, one could provide explicit information on a small set of images as to which of them are relevant or not to their task. Thes...
David R. Hardoon, Kitsuchart Pasupa
MOBIHOC
2009
ACM
14 years 6 months ago
Aging rules: what does the past tell about the future in mobile ad-hoc networks?
The study in mobile ad-hoc networks (MANET) is facing challenges brought by recent discovery of non-exponential behavior of the inter-contact time distribution of mobile nodes. In...
Han Cai, Do Young Eun
SMA
2009
ACM
223views Solid Modeling» more  SMA 2009»
14 years 15 days ago
Particle-based forecast mechanism for continuous collision detection in deformable environments
Collision detection in geometrically complex scenes is crucial in physical simulations and real time applications. Works based on spatial hierarchical structures have been propose...
Thomas Jund, David Cazier, Jean-François Du...
WWW
2007
ACM
14 years 6 months ago
Supervised rank aggregation
This paper is concerned with rank aggregation, the task of combining the ranking results of individual rankers at meta-search. Previously, rank aggregation was performed mainly by...
Yu-Ting Liu, Tie-Yan Liu, Tao Qin, Zhiming Ma, Han...