Sciweavers

55 search results - page 11 / 11
» Simalytic Enterprise Modeling - The Best Of Both Worlds
Sort
View
SACMAT
2009
ACM
13 years 12 months ago
Trojan horse resistant discretionary access control
Modern operating systems primarily use Discretionary Access Control (DAC) to protect files and other operating system resources. DAC mechanisms are more user-friendly than Mandat...
Ziqing Mao, Ninghui Li, Hong Chen, Xuxian Jiang
JUCS
2007
95views more  JUCS 2007»
13 years 5 months ago
A First Step Mapping IMS Learning Design and Moodle
: Mapping the specification IMS Learning Design and the Course Management System Moodle is a logical step forward on interoperability between eLearning systems and specifications i...
Daniel Burgos, Colin Tattersall, Martin Dougiamas,...
WDAG
2007
Springer
73views Algorithms» more  WDAG 2007»
13 years 11 months ago
On Self-stabilizing Synchronous Actions Despite Byzantine Attacks
Consider a distributed network of n nodes that is connected to a global source of “beats”. All nodes receive the “beats” simultaneously, and operate in lock-step. A scheme ...
Danny Dolev, Ezra N. Hoch
ECAI
2006
Springer
13 years 9 months ago
Automatic Term Categorization by Extracting Knowledge from the Web
This paper addresses the problem of categorizing terms or lexical entities into a predefined set of semantic domains exploiting the knowledge available on-line in the Web. The prop...
Leonardo Rigutini, Ernesto Di Iorio, Marco Ernande...
PAMI
2008
275views more  PAMI 2008»
13 years 5 months ago
Coupled Object Detection and Tracking from Static Cameras and Moving Vehicles
Abstract-- We present a novel approach for multi-object tracking which considers object detection and spacetime trajectory estimation as a coupled optimization problem. Our approac...
Bastian Leibe, Konrad Schindler, Nico Cornelis, Lu...