Sciweavers

1805 search results - page 279 / 361
» A Theory of Closure Operators
Sort
View
MOBILITY
2009
ACM
15 years 9 months ago
Context-sensitive authorization in interaction patterns
Main requirement of recent computing environments, like mobile and then ubiquitous computing, is to adapt applications to context. On the other hand, access control generally trus...
Vincent Hourdin, Jean-Yves Tigli, Stephane Lavirot...
ESOP
2001
Springer
15 years 9 months ago
The Def-inite Approach to Dependency Analysis
Abstract. We propose a new representation for the domain of Definite Boolean functions. The key idea is to view the set of models of a Boolean function as an incidence relation be...
Samir Genaim, Michael Codish
ICVS
2001
Springer
15 years 9 months ago
A Framework for Generic State Estimation in Computer Vision Applications
Abstract. Experimenting and building integrated, operational systems in computational vision poses both theoretical and practical challenges, involving methodologies from control t...
Cristian Sminchisescu, Alexandru Telea
IFIP
2001
Springer
15 years 9 months ago
Semiotics and Intelligent Control
The overall purpose of this paper is to demonstrate the relevance of semiotics concepts to the analysis of intelligent control systems. Semiotics has only a minor impact on resear...
Morten Lind
MICCAI
2001
Springer
15 years 9 months ago
Clinical Evaluation of an Automatic Path Tracker for Virtual Colonoscopy
Abstract. Virtual colonoscopy is a minimally invasive technique allowing early detection of colorectal polyps. A path or centerline through the colon can be very useful to perform ...
Roel Truyen, Thomas Deschamps, Laurent D. Cohen