Sciweavers

3025 search results - page 179 / 605
» A User-Centered Location Model
Sort
View
DBSEC
2008
188views Database» more  DBSEC 2008»
15 years 5 months ago
On the Formal Analysis of a Spatio-temporal Role-Based Access Control Model
With the growing use of wireless networks and mobile devices, we are moving towards an era where spatial and temporal information will be necessary for access control. The use of s...
Manachai Toahchoodee, Indrakshi Ray
MIS
2007
Springer
159views Multimedia» more  MIS 2007»
15 years 3 months ago
The application of fluid mobility modelling in wireless cellular networks
Mobility models, synthetic or trace, try to accurately model the movement of a single user or a group of users. Models are used in simulators and emulators to investigate the cons...
Ronan J. Skehill, Sean McGrath
152
Voted
SYNTHESE
2011
96views more  SYNTHESE 2011»
14 years 11 months ago
Models and the locus of their truth
If models can be true, where is their truth located? Giere (e.g. 1988) has suggested an account of theoretical models on which models themselves are not truth-valued. The paper su...
Uskali Mäki
ICPR
2008
IEEE
16 years 5 months ago
Adaptive pore model for fingerprint pore extraction
Sweat pores have been recently employed for automated fingerprint recognition, in which the pores are usually extracted by using a computationally expensive skeletonization method...
Qijun Zhao, Lei Zhang, David Zhang, Nan Luo, Jing ...
DATE
2008
IEEE
78views Hardware» more  DATE 2008»
15 years 10 months ago
Transistor-Specific Delay Modeling for SSTA
SSTA has received a considerable amount of attention in recent years. However, it is a general rule that any approach can only be as accurate as the underlying models. Thus, varia...
Brian Cline, Kaviraj Chopra, David Blaauw, Andres ...