Sciweavers

71 search results - page 9 / 15
» On Tamper-Resistance from a Theoretical Viewpoint
Sort
View
ISF
2008
104views more  ISF 2008»
14 years 11 months ago
An integrative model of trust on IT outsourcing: Examining a bilateral perspective
Trust has been considered a central aspect of successful IT outsourcing from the beginning of the outsourcing relationship to the end. A great deal of interest in trust has been d...
Jae-Nam Lee, Minh Q. Huynh, Rudy Hirschheim
100
Voted
ICCV
2007
IEEE
16 years 1 months ago
Half Quadratic Analysis for Mean Shift: with Extension to A Sequential Data Mode-Seeking Method
Theoretical understanding and extension of mean shift procedure has received much attention recently [8, 18, 3]. In this paper, we present a theoretical exploration and an algorit...
Xiaotong Yuan, Stan Z. Li
ICTAI
2009
IEEE
14 years 9 months ago
A Generalized Cyclic-Clustering Approach for Solving Structured CSPs
We propose a new method for solving structured CSPs which generalizes and improves the Cyclic-Clustering approach [4]. First, the cutset and the tree-decomposition of the constrai...
Cédric Pinto, Cyril Terrioux
HT
2003
ACM
15 years 5 months ago
Which semantic web?
Through scenarios in the popular press and technical papers in the research literature, the promise of the Semantic Web has raised a number of different expectations. These expect...
Catherine C. Marshall, Frank M. Shipman III
TCS
2010
14 years 6 months ago
Combinatorics of labelling in higher-dimensional automata
The main idea for interpreting concurrent processes as labelled precubical sets is that a given set of n actions running concurrently must be assembled to a labelled ncube, in exac...
Philippe Gaucher