Sciweavers

26496 search results - page 5140 / 5300
» An Approach to Computing Ethics
Sort
View
CCS
2007
ACM
15 years 4 months ago
Protecting users from "themselves"
Computer usage and threat models have changed drastically since the advent of access control systems in the 1960s. Instead of multiple users sharing a single file system, each us...
William Enck, Sandra Rueda, Joshua Schiffman, Yoge...
CIA
2007
Springer
15 years 4 months ago
Learning Initial Trust Among Interacting Agents
Trust learning is a crucial aspect of information exchange, negotiation, and any other kind of social interaction among autonomous agents in open systems. But most current probabil...
Achim Rettinger, Matthias Nickles, Volker Tresp
CIVR
2007
Springer
119views Image Analysis» more  CIVR 2007»
15 years 4 months ago
An in-memory relevance feedback technique for high-performance image retrieval systems
Content-based image retrieval with relevant feedback has been widely adopted as the query model of choice for improved effectiveness in image retrieval. The effectiveness of thi...
Ning Yu, Khanh Vu, Kien A. Hua
CIVR
2007
Springer
128views Image Analysis» more  CIVR 2007»
15 years 4 months ago
3D-Model search engine from photos
In this paper, we present the FOX-MIIRE 3D-Model Search Engine. Our search engine is based on Adaptive Views Vlustering (AVC) algorithm [4]. The AVC method uses statistical model ...
Tarik Filali Ansary, Jean-Philippe Vandeborre, Moh...
CONCUR
2007
Springer
15 years 4 months ago
Rule-Based Modelling of Cellular Signalling
Abstract. Modelling is becoming a necessity in studying biological signalling pathways, because the combinatorial complexity of such systems rapidly overwhelms intuitive and qualit...
Vincent Danos, Jérôme Feret, Walter F...
« Prev « First page 5140 / 5300 Last » Next »