Sciweavers

1000 search results - page 188 / 200
» Application Access Control at Network Level
Sort
View
AAAI
2011
12 years 8 months ago
Coarse-to-Fine Inference and Learning for First-Order Probabilistic Models
Coarse-to-fine approaches use sequences of increasingly fine approximations to control the complexity of inference and learning. These techniques are often used in NLP and visio...
Chloe Kiddon, Pedro Domingos
WEBNET
1997
13 years 10 months ago
Cineast - An Extensible Web Browser
: Cineast is a freely available, extensible Web browser which intends to provide an environment for prototyping new client side Internet technologies. Cineast has built-in support ...
Eckhart Köppen, Gustaf Neumann, Stefan Nusser
PROLAMAT
1998
13 years 10 months ago
Cooperative Information Management for Distributed Production Nodes
Advanced manufacturing environments nowadays involve a number of cooperating heterogeneous nodes, where each node supports a distinct activity, and their joint efforts and informa...
Hamideh Afsarmanesh, Ammar Benabdelkader, Louis O....
WISEC
2010
ACM
14 years 3 months ago
Effectiveness of distance-decreasing attacks against impulse radio ranging
We expose the vulnerability of an emerging wireless ranging technology, impulse radio ultra-wide band (IR-UWB), to distance-decreasing attacks on the physical communication layer ...
Manuel Flury, Marcin Poturalski, Panos Papadimitra...
IFIP
1994
Springer
14 years 20 days ago
Exploring user interfaces to improve learning outcomes
The concept of information landscapes has been a constant theme in the development of interactive multimedia packages. For the interface and access to this information to be effec...
John G. Hedberg, Barry Harper, Christine Brown, Ro...