Sciweavers

280 search results - page 55 / 56
» Constraint Systems for Pattern Analysis of Constraint Logic-...
Sort
View
SACMAT
2003
ACM
13 years 10 months ago
Cooperative role-based administration
In large organizations the administration of access privileges (such as the assignment of an access right to a user in a particular role) is handled cooperatively through distribu...
Horst Wedde, Mario Lischka
ECCV
2006
Springer
14 years 7 months ago
Self-calibration of a General Radially Symmetric Distortion Model
Abstract. We present a new approach for self-calibrating the distortion function and the distortion center of cameras with general radially symmetric distortion. In contrast to mos...
Jean-Philippe Tardif, Peter F. Sturm, Sébas...
MSWIM
2009
ACM
14 years 4 days ago
Designing an asynchronous group communication middleware for wireless users
We evaluate an asynchronous gossiping middleware for wireless users that propagates messages from any group member to all the other group members. This propagation can either be i...
Xuwen Yu, Surendar Chandra
AAAI
2007
13 years 7 months ago
Predictive Exploration for Autonomous Science
Often remote investigations use autonomous agents to observe an environment on behalf of absent scientists. Predictive exploration improves these systems’ efficiency with onboa...
David R. Thompson
COMPSAC
2010
IEEE
13 years 3 months ago
Representing and Reasoning about Web Access Control Policies
The advent of emerging technologies such as Web services, service-oriented architecture, and cloud computing has enabled us to perform business services more efficiently and effect...
Gail-Joon Ahn, Hongxin Hu, Joohyung Lee, Yunsong M...