Sciweavers

1529 search results - page 259 / 306
» Energy-Based Models of P Systems
Sort
View
DASFAA
2009
IEEE
125views Database» more  DASFAA 2009»
15 years 4 months ago
Flexibility as a Service
Abstract. The lack of flexibility is often seen as an inhibitor for the successful application of workflow technology. Many researchers have proposed different ways of addressin...
Wil M. P. van der Aalst, Michael Adams, Arthur H. ...
HICSS
2009
IEEE
144views Biometrics» more  HICSS 2009»
15 years 4 months ago
Identity Inference as a Privacy Risk in Computer-Mediated Communication
New Web 2.0 applications, with their emphasis on collaboration and communication, hold the promise of major advances in social connectivity and coordination; however, they also in...
Sara Motahari, Sotirios G. Ziavras, Richard P. Sch...
CCS
2009
ACM
15 years 4 months ago
A probabilistic approach to hybrid role mining
Role mining algorithms address an important access control problem: configuring a role-based access control system. Given a direct assignment of users to permissions, role mining...
Mario Frank, Andreas P. Streich, David A. Basin, J...
CSE
2009
IEEE
15 years 4 months ago
Performance Analysis of an HMM-Based Gesture Recognition Using a Wristwatch Device
—Interaction with mobile devices that are intended for everyday use is challenging since such systems are continuously optimized towards small outlines. Watches are a particularl...
Roman Amstutz, Oliver Amft, Brian French, Asim Sma...
ATAL
2009
Springer
15 years 4 months ago
Analyzing the performance of randomized information sharing
In large, collaborative, heterogeneous teams, team members often collect information that is useful to other members of the team. Recognizing the utility of such information and d...
Prasanna Velagapudi, Oleg A. Prokopyev, Katia P. S...