Sciweavers

10604 search results - page 1828 / 2121
» Computational Fluid Dynamics
Sort
View
SACMAT
2003
ACM
15 years 9 months ago
An approach to engineer and enforce context constraints in an RBAC environment
This paper presents an approach that uses special purpose RBAC constraints to base certain access control decisions on context information. In our approach a context constraint is...
Gustaf Neumann, Mark Strembeck
131
Voted
SENSYS
2003
ACM
15 years 9 months ago
Differentiated surveillance for sensor networks
For many sensor network applications such as military surveillance, it is necessary to provide full sensing coverage to a security-sensitive area while at the same time minimizing...
Ting Yan, Tian He, John A. Stankovic
SIGCOMM
2003
ACM
15 years 9 months ago
Making gnutella-like P2P systems scalable
Napster pioneered the idea of peer-to-peer file sharing, and supported it with a centralized file search facility. Subsequent P2P systems like Gnutella adopted decentralized sea...
Yatin Chawathe, Sylvia Ratnasamy, Lee Breslau, Nic...
SIGIR
2003
ACM
15 years 9 months ago
Question classification using support vector machines
Question classification is very important for question answering. This paper presents our research work on automatic question classification through machine learning approaches. W...
Dell Zhang, Wee Sun Lee
VRML
2003
ACM
15 years 9 months ago
Implementation of a scripting language for VRML/X3D-based embodied agents
Embodied agents or humanoid avatars may effectively be used to communicate with human users. Currently there is a wide range of specification formalisms and scripting languages f...
Zhisheng Huang, Anton Eliëns, Cees T. Visser
« Prev « First page 1828 / 2121 Last » Next »