Sciweavers

359 search results - page 66 / 72
» Supporting Real World Security Models in Java
Sort
View
77
Voted
CANDC
2009
ACM
15 years 1 months ago
Computational and cognitive infrastructures of stigma: empowering identity in social computing and gaming
Computing technologies such as games, social networking sites, and virtual environments often reproduce forms of social stigma encountered in everyday real life, as well as introd...
D. Fox Harrell
72
Voted
DAC
2002
ACM
15 years 10 months ago
A universal technique for fast and flexible instruction-set architecture simulation
In the last decade, instruction-set simulators have become an essential development tool for the design of new programmable architectures. Consequently, the simulator performance ...
Achim Nohl, Gunnar Braun, Oliver Schliebusch, Rain...
CIVR
2007
Springer
144views Image Analysis» more  CIVR 2007»
15 years 3 months ago
Image retrieval on large-scale image databases
Online image repositories such as Flickr contain hundreds of millions of images and are growing quickly. Along with that the needs for supporting indexing, searching and browsing ...
Eva Hörster, Rainer Lienhart, Malcolm Slaney
ISIPTA
1999
IEEE
116views Mathematics» more  ISIPTA 1999»
15 years 1 months ago
On the Distribution of Natural Probability Functions
The purpose of this note is to describe the underlying insights and results obtained by the authors, and others, in a series of papers aimed at modelling the distribution of `natu...
Jeff B. Paris, Paul N. Watton, George M. Wilmers
WWW
2009
ACM
15 years 10 months ago
Seller's credibility in electronic markets: a complex network based approach
In the last decade, there has been an explosion of online commercial activity enabled by the World Wide Web. An electronic marketplace (e-market) provides an online method to perf...
Adriano M. Pereira, Arlei Silva, Wagner Meira Jr.,...