Sciweavers

3608 search results - page 532 / 722
» computing 2011
Sort
View
URBAN
2011
185views more  URBAN 2011»
14 years 10 months ago
Supporting geographically-aware web document foraging and sensemaking
This paper reports on the development and application of strategies and tools for geographic information seeking and knowledge building that leverages unstructured text resources ...
Brian M. Tomaszewski, Justine Blanford, Kevin Ross...
TVCG
2011
136views more  TVCG 2011»
14 years 10 months ago
Interactive Mesh Cutting Using Constrained Random Walks
—This paper considers the problem of interactively finding the cutting contour to extract components from an existing mesh. First, we propose a constrained random walks algorith...
Juyong Zhang, Jianmin Zheng, Jianfei Cai
CODASPY
2011
14 years 7 months ago
Relationship-based access control: protection model and policy language
Social Network Systems pioneer a paradigm of access control that is distinct from traditional approaches to access control. Gates coined the term Relationship-Based Access Control...
Philip W. L. Fong
IEPOL
2011
43views more  IEPOL 2011»
14 years 7 months ago
Evidence of a modest price decline in US broadband services
In this paper, we construct a price index for broadband services in the United States between 2004 and 2009. We analyze over 1500 service contracts offered by DSL and cable provid...
Shane Greenstein, Ryan McDevitt
JAIR
2011
214views more  JAIR 2011»
14 years 6 months ago
Stackelberg vs. Nash in Security Games: An Extended Investigation of Interchangeability, Equivalence, and Uniqueness
There has been significant recent interest in game theoretic approaches to security, with much of the recent research focused on utilizing the leader-follower Stackelberg game mo...
Dmytro Korzhyk, Zhengyu Yin, Christopher Kiekintve...