Sciweavers

1528 search results - page 135 / 306
» Implementing Generalized Operator Overloading
Sort
View
114
Voted
IDTRUST
2010
ACM
15 years 7 months ago
CardSpace-liberty integration for CardSpace users
Whilst the growing number of identity management systems have the potential to reduce the threat of identity attacks, major deployment problems remain because of the lack of inter...
Haitham S. Al-Sinani, Waleed A. Alrodhan, Chris J....
HICSS
2003
IEEE
134views Biometrics» more  HICSS 2003»
15 years 7 months ago
Secure Connections in Bluetooth Scatternets
Bluetooth is a wireless networking technology specifically developed for Personal Area Networking and other short range applications. Bluetooth devices can be networked together ...
Karl E. Persson, D. Manivannan
110
Voted
ICVS
2003
Springer
15 years 7 months ago
VICs: A Modular Vision-Based HCI Framework
Many Vision-Based Human-Computer Interaction (VB-HCI) systems are based on the tracking of user actions. Examples include gazetracking, head-tracking, finger-tracking, and so fort...
Guangqi Ye, Jason J. Corso, Darius Burschka, Grego...
CPAIOR
2010
Springer
15 years 7 months ago
Constraint Reasoning with Uncertain Data Using CDF-Intervals
Interval coefficients have been introduced in OR and CP to specify uncertain data in order to provide reliable solutions to convex models. The output is generally a solution set, ...
Aya Saad, Carmen Gervet, Slim Abdennadher
SARA
2009
Springer
15 years 7 months ago
Rewriting Constraint Models with Metamodels
An important challenge in constraint programming is to rewrite constraint models into executable programs calculating the solutions. This phase of constraint processing may requir...
Raphaël Chenouard, Laurent Granvilliers, Rica...