Sciweavers

306 search results - page 29 / 62
» Fault-Tolerant Computation in the Full Information Model
Sort
View
93
Voted
CCS
2004
ACM
15 years 3 months ago
Comparing the expressive power of access control models
Comparing the expressive power of access control models is recognized as a fundamental problem in computer security. Such comparisons are generally based on simulations between di...
Mahesh V. Tripunitara, Ninghui Li
DAGM
2010
Springer
14 years 7 months ago
3D Reconstruction Using an n-Layer Heightmap
We present a novel method for 3D reconstruction of urban scenes extending a recently introduced heightmap model. Our model has several advantages for 3D modeling of urban scenes: i...
David Gallup, Marc Pollefeys, Jan-Michael Frahm
SIGIR
2011
ACM
14 years 13 days ago
Fast context-aware recommendations with factorization machines
The situation in which a choice is made is an important information for recommender systems. Context-aware recommenders take this information into account to make predictions. So ...
Steffen Rendle, Zeno Gantner, Christoph Freudentha...
52
Voted
JCD
2000
72views more  JCD 2000»
14 years 9 months ago
Participating from the sidelines, online: facilitating telementoring projects
Asynchronous, text-based communication is different from most other forms of interchange in important ways. It lacks the full spectrum of visual and audible information that peopl...
Judith B. Harris, Candace Figg
82
Voted
EFDBS
2003
14 years 11 months ago
Implementing Mediators through Virtual Updateable Views
Mediators are considered basic architectural units for integration of distributed, heterogeneous information resources. In the paper we propose powerful virtual updateable views as...
Hanna Kozankiewicz, Jacek Leszczylowski, Kazimierz...