Sciweavers

1131 search results - page 104 / 227
» Making Sense of Twitter
Sort
View
ACSAC
2008
IEEE
15 years 11 months ago
The Role Hierarchy Mining Problem: Discovery of Optimal Role Hierarchies
Role hierarchies are fundamental to the role based access control (RBAC) model. The notion of role hierarchy is a well understood concept that allows senior roles to inherit the p...
Qi Guo, Jaideep Vaidya, Vijayalakshmi Atluri
HICSS
2007
IEEE
85views Biometrics» more  HICSS 2007»
15 years 10 months ago
A Program of Study of the Use of Stories in DSS
Storytelling is an innate human characteristic. Stories are used to manage meaning, control behavior, and facilitate identification and bonding [9]. The theory of identification a...
David B. Paradice
ICRA
2007
IEEE
137views Robotics» more  ICRA 2007»
15 years 10 months ago
Disturbance Rejection for Biped Humanoids
— This paper proposes a simple passivity-based disturbance rejection scheme for force-controllable biped humanoids. The disturbance rejection by force control is useful not only ...
Sang-Ho Hyon, Gordon Cheng
IROS
2007
IEEE
108views Robotics» more  IROS 2007»
15 years 10 months ago
Hiding the acoustic signature of a mobile robot
—A mobile robot can be a rather significant source of noise: noisy fans cool onboard computers, motors are spinning, rubber wheels are squeaking against the floor, and mechanical...
Eric Martinson
CCECE
2006
IEEE
15 years 10 months ago
Software Defect Content Estimation: A Bayesian Approach
Software inspection is a method to detect errors in software artefacts early in the development cycle. At the end of the inspection process the inspectors need to make a decision ...
Achin Jain, Alok R. Patnaik, Pulak Dhar, Vineet Sr...