Sciweavers

2250 search results - page 9 / 450
» Authorizing applications in singularity
Sort
View
64
Voted
SYBEN
1998
89views more  SYBEN 1998»
14 years 11 months ago
Authoring Hypermedia Training Applications
This paper presents an approach for authoring training applications. In this approach we think an author can undertake two roles: the meta-authoring role and the authoring role. A...
Aphrodite Tsalgatidou, M. Anastasiou, D. Plevria, ...
103
Voted
IPPS
2009
IEEE
15 years 4 months ago
Singular value decomposition on GPU using CUDA
Linear algebra algorithms are fundamental to many computing applications. Modern GPUs are suited for many general purpose processing tasks and have emerged as inexpensive high per...
Sheetal Lahabar, P. J. Narayanan
ACSAC
2001
IEEE
15 years 1 months ago
A Framework for Multiple Authorization Types in a Healthcare Application System
In most of the current authorization frameworks in application systems, the authorization for a user operation is determined using a static database like ACL entries or system tab...
Ramaswamy Chandramouli
IJCNN
2007
IEEE
15 years 3 months ago
Sparse Distributed Representations for Words with Thresholded Independent Component Analysis
— We show that independent component analysis (ICA) can be used to find distributed representations for words that can be further processed by thresholding to produce sparse rep...
Jaakko J. Väyrynen, Lasse Lindqvist, Timo Hon...
IJCV
1998
110views more  IJCV 1998»
14 years 9 months ago
Determining the Epipolar Geometry and its Uncertainty: A Review
Two images of a single scene/object are related by the epipolar geometry, which can be described by a 3x3 singular matrix called the essential matrix if images’ internal paramete...
Zhengyou Zhang