Sciweavers

196 search results - page 25 / 40
» A Hacking View of Access Control
Sort
View
IADIS
2003
13 years 11 months ago
Improving Internet Research Methods: A Web Laboratory
We describe the current state of a resource that enables research in the human sciences with differential access rights for experimenters and participants in experiments. We outli...
Maria Buckley, Carl Vogel
ICCV
1999
IEEE
14 years 11 months ago
Euclidean Reconstruction and Reprojection up to Subgroups
The necessary and sufficient conditions for being able to estimate scene structure, motion and camera calibration from a sequence of images are very rarely satisfied in practice. ...
Yi Ma, Stefano Soatto, Jana Kosecka, Shankar Sastr...
PODS
2008
ACM
204views Database» more  PODS 2008»
14 years 9 months ago
Annotated XML: queries and provenance
We present a formal framework for capturing the provenance of data appearing in XQuery views of XML. Building on previous work on relations and their (positive) query languages, w...
J. Nathan Foster, Todd J. Green, Val Tannen
AUIC
2006
IEEE
14 years 3 months ago
Virtual planning rooms (ViPR): a 3D visualisation environment for hierarchical information
The Future Operations Centre Analysis Laboratory (FOCAL) at Australia’s Defence Science and Technology Organisation (DSTO) is aimed at exploring new paradigms for situation awar...
Michael Broughton
NCA
2005
IEEE
14 years 3 months ago
An Adaptive Reputation-based Trust Framework for Peer-to-Peer Applications
In distributed P2P environments, peers (i.e., users) often have to request the services from some unfamiliar peers (i.e., resources) that could be altruistic, selfish, or even ma...
William Sears, Zhen Yu, Yong Guan