Sciweavers

729 search results - page 79 / 146
» Computing persistent homology
Sort
View
FOSSACS
2005
Springer
15 years 3 months ago
Bridging Language-Based and Process Calculi Security
Language-based and process calculi-based information security are well developed fields of computer security. Although these fields have much in common, it is somewhat surprising...
Riccardo Focardi, Sabina Rossi, Andrei Sabelfeld
GI
2004
Springer
15 years 3 months ago
Transforming XML Schemas into Java Swing GUIs
: When designing an XML-based Web Content Management System (WCMS), one usually has to define and maintain two separate entities just for the editorial part: the database schemes ...
Patrick Lay, Stefan Lüttringhaus-Kappel
ACSC
2002
IEEE
15 years 2 months ago
Bracket Capabilities for Distributed Systems Security
The per-method access control lists of standard middleware technologies allow only simple forms of access control to be expressed and enforced. Research systems based on capabilit...
Mark Evered
ICRA
2002
IEEE
161views Robotics» more  ICRA 2002»
15 years 2 months ago
Mosaicing Large Cyclic Environments for Visual Navigation in Autonomous Vehicles
Mobile robot localization from large-scale appearance mosaics has been showing increasing promise as a low-cost, high-performance and infrastructure-free solution to vehicle guida...
Ranjith Unnikrishnan, Alonzo Kelly
CHI
2000
ACM
15 years 2 months ago
Tagged handles: merging discrete and continuous manual control
Discrete and continuous modes of manual control are fundamentally different: buttons select or change state, while handles persistently modulate an analog parameter. User interfac...
Karon E. MacLean, Scott S. Snibbe, Golan Levin