Sciweavers

7715 search results - page 1187 / 1543
» Visual Rules Modeling
Sort
View
SP
1997
IEEE
134views Security Privacy» more  SP 1997»
15 years 8 months ago
A Logical Language for Expressing Authorizations
A major drawback of existing access control systems is that they have all been developed with a specific access control policy in mind. This means that all protection requirement...
Sushil Jajodia, Pierangela Samarati, V. S. Subrahm...
AVBPA
1997
Springer
100views Biometrics» more  AVBPA 1997»
15 years 8 months ago
Using Gait as a Biometric, via Phase-weighted Magnitude Spectra
Gait is a biometric which is subject to increasing interest. Current approaches include modelling gait as a spatio-temporal sequence and as an articulated model. By considering leg...
David Cunado, Mark S. Nixon, John N. Carter
141
Voted
AIIA
2007
Springer
15 years 8 months ago
Advanced Tree-Based Kernels for Protein Classification
One of the aims of modern Bioinformatics is to discover the molecular mechanisms that rule the protein operation. This would allow us to understand the complex processes involved i...
Elisa Cilia, Alessandro Moschitti
DIAL
2004
IEEE
173views Image Analysis» more  DIAL 2004»
15 years 8 months ago
Citation Recognition for Scientific Publications in Digital Libraries
In this paper, a method based on part-of-speech tagging (PoS) is used for bibliographic reference structure. This method operates on a roughly structured ASCII file, produced by O...
Dominique Besagni, Abdel Belaïd
136
Voted
ITS
2000
Springer
110views Multimedia» more  ITS 2000»
15 years 8 months ago
Limitations of Student Control: Do Students Know When They Need Help?
Intelligent tutoring systems often emphasize learner control: They let the students decide when and how to use the system's intelligent and unintelligent help facilities. This...
Vincent Aleven, Kenneth R. Koedinger
« Prev « First page 1187 / 1543 Last » Next »