Sciweavers

192 search results - page 12 / 39
» Actor-Centric Modeling of User Rights
Sort
View
ENVSOFT
2002
129views more  ENVSOFT 2002»
13 years 7 months ago
Linking GIS and water resources management models: an object-oriented method
Many challenges are associated with the integration of geographic information systems (GISs) with models in specific applications. One of them is adapting models to the environmen...
Daene C. McKinney, Ximing Cai
CAD
2005
Springer
13 years 7 months ago
Efficiency of boundary evaluation for a cellular model
Feature modeling systems usually employ a boundary representation (b-rep) to store the shape information on a product. It has, however, been shown that a b-rep has a number of sho...
Rafael Bidarra, Joaquim Madeira, Willem J. Neels, ...
COMCOM
2004
84views more  COMCOM 2004»
13 years 7 months ago
A self-extracting accurate modeling for bounded-delay video services
This article proposes the XGOP-B deterministic traffic model for MPEG video services requiring strict bounds on the quality of service provided by the network. The XGOP-B model ta...
Marcelo Dias de Amorim, Otto Carlos Muniz Bandeira...
IJMMS
2007
114views more  IJMMS 2007»
13 years 7 months ago
A fuzzy physiological approach for continuously modeling emotion during interaction with play technologies
The popularity of computer games has exploded in recent years, yet methods of evaluating user emotional state during play experiences lag far behind. There are few methods of asse...
Regan L. Mandryk, M. Stella Atkins
KDD
1998
ACM
170views Data Mining» more  KDD 1998»
13 years 12 months ago
Mining Audit Data to Build Intrusion Detection Models
In this paper we discuss a data mining framework for constructing intrusion detection models. The key ideas are to mine system audit data for consistent and useful patterns of pro...
Wenke Lee, Salvatore J. Stolfo, Kui W. Mok