Sciweavers

4983 search results - page 121 / 997
» order 2008
Sort
View
COLCOM
2008
IEEE
15 years 7 months ago
A Constraint and Attribute Based Security Framework for Dynamic Role Assignment in Collaborative Environments
Abstract. We investigate a security framework for collaborative applications that relies on the role-based access control (RBAC) model. In our framework, roles are pre-defined and...
Isabel F. Cruz, Rigel Gjomemo, Benjamin Lin, Mirko...
92
Voted
IROS
2008
IEEE
137views Robotics» more  IROS 2008»
15 years 7 months ago
Avoiding negative depth in inverse depth bearing-only SLAM
Abstract— In this paper we consider ways to alleviate negative estimated depth for the inverse depth parameterisation of bearing-only SLAM. This problem, which can arise even if ...
Martin P. Parsley, Simon J. Julier
91
Voted
ACL
2008
15 years 2 months ago
Unsupervised Learning of Narrative Event Chains
Hand-coded scripts were used in the 1970-80s as knowledge backbones that enabled inference and other NLP tasks requiring deep semantic knowledge. We propose unsupervised induction...
Nathanael Chambers, Daniel Jurafsky
COMAD
2008
15 years 2 months ago
Efficient Evaluation of Forward XPath Axes over XML Streams
Although many algorithms have been proposed for evaluating XPath queries containing un-ordered axes (child, descendant, parent and ancestor) against streaming XML data, there are ...
Abdul Nizar, P. Sreenivasa Kumar
84
Voted
DM
2006
91views more  DM 2006»
15 years 24 days ago
Fast perfect sampling from linear extensions
In this paper, we study the problem of sampling (exactly) uniformly from the set of linear extensions of an arbitrary partial order. Previous Markov chain techniques have yielded ...
Mark Huber