Sciweavers

4498 search results - page 642 / 900
» How to Invent Functions
Sort
View
ACSAC
2002
IEEE
15 years 9 months ago
A Financial Institution's Legacy Mainframe Access Control System in Light of the Proposed NIST RBAC Standard
In this paper we describe a mainframe access control system (DENT) and its associated delegated administration tool (DSAS) that were used in a financial institution for over 20 y...
Andrew D. Marshall
CA
2002
IEEE
15 years 9 months ago
Representing and Parameterizing Agent Behaviors
The last few years have seen great maturation in understanding how to use computer graphics technology to portray 3D embodied characters or virtual humans. Unlike the off-line, an...
Norman I. Badler, Jan M. Allbeck, Liwei Zhao, Meer...
ECRTS
2002
IEEE
15 years 9 months ago
Scope-Tree: A Program Representation for Symbolic Worst-Case Execution Time Analysis
Most WCET analysis techniques only provide an upper bound on the worst case execution time as a constant value. However, it often appears that the execution time of a piece of cod...
Antoine Colin, Guillem Bernat
HICSS
2002
IEEE
91views Biometrics» more  HICSS 2002»
15 years 9 months ago
Neuroimaging Studies Give New Insight to Mental Rotation
This paper summarizes the recent findings of mental rotation studies which use neuroimaging techniques. Though many results differed, almost all the reviewed studies concurred tha...
Wendy S. Ark
HICSS
2002
IEEE
122views Biometrics» more  HICSS 2002»
15 years 9 months ago
Democratic Participation in the Discursive Management of Usenet
Internet voting, sometimes proposed as a means of enhancing democratic participation, is partly inspired by the democratic process of newsgroup creation on Usenet. To better under...
John C. Paolillo, David Heald