Sciweavers

344 search results - page 50 / 69
» The Well Mannered Wearable Computer
Sort
View
ICISC
2004
127views Cryptology» more  ICISC 2004»
15 years 3 months ago
Identity-Based Access Control for Ad Hoc Groups
Abstract. The proliferation of group-centric computing and communication motivates the need for mechanisms to provide group access control. Group access control includes mechanisms...
Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
152
Voted
DICTA
2003
15 years 3 months ago
Probabilistic Multiple Cue Integration for Particle Filter Based Tracking
Robust visual tracking has become an important topic in the field of computer vision. The integration of cues such as color, edge strength and motion has proved to be a promising ...
Chunhua Shen, Anton van den Hengel, Anthony R. Dic...
117
Voted
ENTCS
2002
113views more  ENTCS 2002»
15 years 1 months ago
An Operational Semantics for Declarative Multi-Paradigm Languages
Practical declarative multi-paradigm languages combine the main features of functional, logic and concurrent programming (e.g., laziness, sharing, higher-order, logic variables, n...
Elvira Albert, Michael Hanus, Frank Huch, Javier O...
SIGMOD
2002
ACM
127views Database» more  SIGMOD 2002»
15 years 1 months ago
Workflow management with service quality guarantees
Workflow management systems (WFMS) that are geared for the orchestration of business processes across multiple organizations are complex distributed systems: they consist of multi...
Michael Gillmann, Gerhard Weikum, Wolfgang Wonner
SAGT
2010
Springer
119views Game Theory» more  SAGT 2010»
15 years 7 days ago
Minimal Subsidies in Expense Sharing Games
A key solution concept in cooperative game theory is the core. The core of an expense sharing game contains stable allocations of the total cost to the participating players, such ...
Reshef Meir, Yoram Bachrach, Jeffrey S. Rosenschei...