Sciweavers

1818 search results - page 222 / 364
» How users use access control
Sort
View
BTW
2009
Springer
168views Database» more  BTW 2009»
15 years 7 months ago
Embedded Analytics in Front Office Applications
: Today, decision making by users of front office applications happens without analytical information supporting this process. We propose as solution Embedded Analytics (EA) making...
Martin Oberhofer, Erik Nijkamp
ECCV
1994
Springer
16 years 6 months ago
Parameterfree Information-Preserving Surface Restoration
Abstract. In this paper wepresent an algorithm for parameterfree informationpreserving surface restoration. The algorithm is designed for 2.5D and 3D surfaces. The basic idea is to...
Uwe Weidner
MM
2006
ACM
116views Multimedia» more  MM 2006»
15 years 10 months ago
Mobile camera supported document redirection
In this demonstration, we are going to illustrate how to use a mobile camera to redirect documents to various devices connected to the same network. Categories and Subject Descrip...
Qiong Liu, Paul McEvoy, Cheng-Jia Lai
KRDB
2003
139views Database» more  KRDB 2003»
15 years 5 months ago
Expressing Transactions with Savepoints as Non-Markovian Theories of Actions
Flat transactions with savepoints are a variation of the classical flat transactions that allows the user to go undo work done so far back to a certain point within the transacti...
Iluju Kiringa, Alfredo Gabaldon
PERVASIVE
2007
Springer
15 years 10 months ago
Operating Appliances with Mobile Phones - Strengths and Limits of a Universal Interaction Device
Abstract. Mobile phones are increasingly becoming ubiquitous computational devices that are almost always available, individually adaptable, and nearly universally connectable (usi...
Christof Roduner, Marc Langheinrich, Christian Flo...