Sciweavers

2010 search results - page 215 / 402
» On Object Extension
Sort
View
161
Voted
JFP
2006
89views more  JFP 2006»
15 years 5 months ago
Featherweight generic confinement
Existing approaches to object encapsulation and confinement either rely on restrictions to programs or require the use of specialised ownership type systems. Syntactic restriction...
Alex Potanin, James Noble, Dave Clarke, Robert Bid...
154
Voted
MVA
2008
140views Computer Vision» more  MVA 2008»
15 years 5 months ago
An occlusion metric for selecting robust camera configurations
Vision based tracking systems for surveillance and motion capture rely on a set of cameras to sense the environment. The exact placement or configuration of these cameras can have...
Xing Chen, James Davis
LOBJET
2006
105views more  LOBJET 2006»
15 years 5 months ago
Expression and Composition of Design Patterns with AspectJ
ABSTRACT. Design patterns are well-known couples of problems-solutions for software engineering. By nature, they often lack support from languages and this further complicates the ...
Simon Denier, Pierre Cointe
117
Voted
NECO
2008
116views more  NECO 2008»
15 years 5 months ago
A (Somewhat) New Solution to the Variable Binding Problem
To perform automatic, unconscious inference, the human brain must solve the "binding problem" by correctly grouping properties with objects. Temporal binding models like...
Leon Barrett, Jerome Feldman, Liam Mac Dermed
IJNSEC
2007
127views more  IJNSEC 2007»
15 years 4 months ago
A Web-based Multilayer Access Control Model for Multimedia Applications in MPEG-7
This paper presents a Criterion-Based Role-Based Access Control model in which secure permissions (SP), secure operations (SOp), secure objects (SOb), and secure users (SU) are in...
Leon Pan