Sciweavers

955 search results - page 144 / 191
» Model Checking Operator Procedures
Sort
View
114
Voted
CBSE
2005
Springer
15 years 6 months ago
Exogenous Connectors for Software Components
In existing component models, control originates in components, and connectors are channels for passing on the control to other components. This provides a mechanism for message pa...
Kung-Kiu Lau, Perla Velasco Elizondo, Zheng Wang
SMA
2003
ACM
115views Solid Modeling» more  SMA 2003»
15 years 6 months ago
Estimating the in/out function of a surface represented by points
We present a method to estimate the in/out function of a closed surface represented by an unorganized set of data points. From the in/out function, we compute an approximation of ...
Vinícius Mello, Luiz Velho, Gabriel Taubin
105
Voted
IATA
1998
Springer
15 years 5 months ago
Agent-Based Schemes for Plug-And-Play Network Components
In this paper, we present several approaches to making the process of configuring network devices easier than is currently the case. Configuring a device requires that a number of ...
Andrzej Bieszczad, Syed Kamran Raza, Bernard Pagur...
ICPR
2006
IEEE
16 years 1 months ago
Using Specularities to Recover Multiple Light Sources in the Presence of Texture
Recovering multiple point light sources from a sparse set of photographs in which objects of unknown texture can move is challenging. This is because both diffuse and specular ref...
Pascal Lagger, Pascal Fua
233
Voted
ECOOP
2009
Springer
16 years 1 months ago
Fine-Grained Access Control with Object-Sensitive Roles
Role-based access control (RBAC) is a common paradigm to ensure that users have sufficient rights to perform various system operations. In many cases though, traditional RBAC does ...
Jeffrey Fischer, Daniel Marino, Rupak Majumdar, To...