Sciweavers

364 search results - page 54 / 73
» Generalized normal forms and polynomial system solving
Sort
View
CCS
2006
ACM
15 years 1 months ago
Resiliency policies in access control
We introduce the notion of resiliency policies in the context of access control systems. Such policies require an access control system to be resilient to the absence of users. An...
Ninghui Li, Mahesh V. Tripunitara, Qihua Wang
HICSS
2006
IEEE
146views Biometrics» more  HICSS 2006»
15 years 3 months ago
A Taxonomy for RFID
—Ben Clacy and Brian Jennings presented their recently published paper with the title of “service management: driving the future of IT” [1], which highlighted service oriente...
Taimur Hassan, Samir Chatterjee
ICCAD
2002
IEEE
142views Hardware» more  ICCAD 2002»
15 years 6 months ago
SAT and ATPG: Boolean engines for formal hardware verification
In this survey, we outline basic SAT- and ATPGprocedures as well as their applications in formal hardware verification. We attempt to give the reader a trace trough literature and...
Armin Biere, Wolfgang Kunz
TREC
2003
14 years 11 months ago
Searching for geneRIFs: Concept-Based Query Expansion and Bayes Classification
k gene annotations. Our indexing machinery produces per indexed MEDLINE abstract a list of concepts with an accompanying weight, termed a fingerprint. Searching is done by matching...
Rob Jelier, Martijn J. Schuemie, C. Christiaan van...
MHCI
2009
Springer
15 years 2 months ago
Glancephone: an exploration of human expression
In this paper, we describe the design and ethnographic study of a phone developed so as to allow people to glance at each other, rather than simply message or voice call. Glanceph...
Richard H. R. Harper, Stuart Taylor