Sciweavers

596 search results - page 44 / 120
» Theories of Access Consciousness
Sort
View
94
Voted
CDC
2009
IEEE
132views Control Systems» more  CDC 2009»
15 years 5 months ago
A mechanism design approach to the stabilization of networked dynamical systems
— In this paper we study the problem of stabilizing a networked control system (NCS) composed of N linear dynamical subplants and an equal number of controllers acting over a sha...
Luca Galbusera, Nicola Gatti, Carlo Romani
106
Voted
DMDW
2000
118views Management» more  DMDW 2000»
15 years 2 months ago
View security as the basis for data warehouse security
Access. permissions in a data warehouse are currently managed in a separate world from the sources' policies. The consequences are inconsistencies, slow response to change, a...
Arnon Rosenthal, Edward Sciore
SIGCSE
2008
ACM
132views Education» more  SIGCSE 2008»
15 years 18 days ago
Course experiences of computing students with disabilities: four case studies
Inclusive education is the practice of making sure that all students of all abilities have positive learning experiences. The study presented in this paper explores the current st...
Katherine Deibel
122
Voted
JSW
2007
126views more  JSW 2007»
15 years 17 days ago
On Remote and Virtual Experiments in eLearning
— The science of physics is based on theories and models as well as experiments: the former structure relations and simplify reality to a degree such that predictions on physical...
Sabina Jeschke, Harald Scheel, Thomas Richter, Chr...
IANDC
2010
105views more  IANDC 2010»
14 years 11 months ago
Symmetries, local names and dynamic (de)-allocation of names
The semantics of name-passing calculi is often defined employing coalgebraic models over presheaf categories. This elegant theory lacks finiteness properties, hence it is not ap...
Vincenzo Ciancia, Ugo Montanari