Sciweavers

55 search results - page 11 / 11
» Simalytic Enterprise Modeling - The Best Of Both Worlds
Sort
View
SACMAT
2009
ACM
15 years 4 months ago
Trojan horse resistant discretionary access control
Modern operating systems primarily use Discretionary Access Control (DAC) to protect files and other operating system resources. DAC mechanisms are more user-friendly than Mandat...
Ziqing Mao, Ninghui Li, Hong Chen, Xuxian Jiang
JUCS
2007
95views more  JUCS 2007»
14 years 9 months ago
A First Step Mapping IMS Learning Design and Moodle
: Mapping the specification IMS Learning Design and the Course Management System Moodle is a logical step forward on interoperability between eLearning systems and specifications i...
Daniel Burgos, Colin Tattersall, Martin Dougiamas,...
WDAG
2007
Springer
73views Algorithms» more  WDAG 2007»
15 years 3 months ago
On Self-stabilizing Synchronous Actions Despite Byzantine Attacks
Consider a distributed network of n nodes that is connected to a global source of “beats”. All nodes receive the “beats” simultaneously, and operate in lock-step. A scheme ...
Danny Dolev, Ezra N. Hoch
ECAI
2006
Springer
15 years 1 months ago
Automatic Term Categorization by Extracting Knowledge from the Web
This paper addresses the problem of categorizing terms or lexical entities into a predefined set of semantic domains exploiting the knowledge available on-line in the Web. The prop...
Leonardo Rigutini, Ernesto Di Iorio, Marco Ernande...
PAMI
2008
275views more  PAMI 2008»
14 years 9 months ago
Coupled Object Detection and Tracking from Static Cameras and Moving Vehicles
Abstract-- We present a novel approach for multi-object tracking which considers object detection and spacetime trajectory estimation as a coupled optimization problem. Our approac...
Bastian Leibe, Konrad Schindler, Nico Cornelis, Lu...