Sciweavers

177 search results - page 34 / 36
» Towards more Reuse in Conceptual Modeling - A Combined Appro...
Sort
View
GAMESEC
2010
244views Game Theory» more  GAMESEC 2010»
13 years 3 months ago
The Password Game: Negative Externalities from Weak Password Practices
The combination of username and password is widely used as a human authentication mechanism on the Web. Despite this universal adoption and despite their long tradition, password s...
Sören Preibusch, Joseph Bonneau
ATAL
2005
Springer
13 years 11 months ago
Kaa: policy-based explorations of a richer model for adjustable autonomy
Though adjustable autonomy is hardly a new topic in agent systems, there has been a general lack of consensus on terminology and basic concepts. In this paper, we describe the mul...
Jeffrey M. Bradshaw, Hyuckchul Jung, Shriniwas Kul...
ICARCV
2006
IEEE
420views Robotics» more  ICARCV 2006»
13 years 11 months ago
Recognizing People's Faces: from Human to Machine Vision
— As confirmed by recent neurophysiological studies, the use of dynamic information is extremely important for humans in visual perception of biological forms and motion. Apart ...
Massimo Tistarelli, Manuele Bicego, Enrico Grosso
RECOMB
2006
Springer
14 years 5 months ago
Genome-Wide Discovery of Modulators of Transcriptional Interactions in Human B Lymphocytes
Abstract. Transcriptional interactions in a cell are modulated by a variety of mechanisms that prevent their representation as pure pairwise interactions between a transcription fa...
Kai Wang, Ilya Nemenman, Nilanjana Banerjee, Adam ...
EDBT
2004
ACM
147views Database» more  EDBT 2004»
14 years 5 months ago
Projection Pushing Revisited
The join operation, which combines tuples from multiple relations, is the most fundamental and, typically, the most expensive operation in database queries. The standard approach t...
Benjamin J. McMahan, Guoqiang Pan, Patrick Porter,...