Sciweavers

2250 search results - page 115 / 450
» Authorizing applications in singularity
Sort
View
EMMCVPR
2007
Springer
15 years 4 months ago
Decomposing Document Images by Heuristic Search
Abstract. Document decomposition is a basic but crucial step for many document related applications. This paper proposes a novel approach to decompose document images into zones. I...
Dashan Gao, Yizhou Wang
ICWS
2004
IEEE
14 years 11 months ago
Access Control for Semantic Web Services
In this paper we make a contribution to the proof and trust layer of the Semantic Web layer cake by integrating two well founded techniques, namely DAML-S (for describing Web serv...
Sudhir Agarwal, Barbara Sprick
JUCS
2008
125views more  JUCS 2008»
14 years 10 months ago
Improving AEH Courses through Log Analysis
: Authoring in adaptive educational hypermedia environment is complex activity. In order to promote a wider application of this technology, the teachers and course designers need s...
César Vialardi Sacín, Javier Bravo, ...
TROB
2008
101views more  TROB 2008»
14 years 10 months ago
Fundamental Limitations on Designing Optimally Fault-Tolerant Redundant Manipulators
Abstract--In this paper, the authors examine the problem of designing nominal manipulator Jacobians that are optimally fault tolerant to one or more joint failures. Optimality is d...
Rodney G. Roberts, Hyun Geun Yu, Anthony A. Maciej...
ACMDIS
2010
ACM
14 years 10 months ago
The CLOTHO project: predicting application utility
When using the computer, each user has some notion that "these applications are important" at a given point in time. We term this subset of applications that the user va...
Joshua M. Hailpern, Nicholas Jitkoff, Joseph Subid...