Sciweavers

349 search results - page 21 / 70
» Computer Security Research: Approaches and Assumptions
Sort
View
CCS
2010
ACM
14 years 3 months ago
Effective trust management through a hybrid logical and relational approach
Despite a plethora of recent research regarding trust management approaches to authorization, relatively little attention has been given to exactly how these technologies can be e...
Adam J. Lee, Ting Yu, Yann Le Gall
CPAIOR
2007
Springer
14 years 2 months ago
Replenishment Planning for Stochastic Inventory Systems with Shortage Cost
One of the most important policies adopted in inventory control is the (R,S) policy (also known as the “replenishment cycle” policy). Under the non-stationary demand assumption...
Roberto Rossi, Armagan Tarim, Brahim Hnich, Steven...
IROS
2006
IEEE
116views Robotics» more  IROS 2006»
14 years 2 months ago
On the Importance of Asymmetries in Grasp Quality Metrics for Tendon Driven Hands
Abstract— Grasp quality measures are important for understanding how to plan for and maintain appropriate and secure grasps for pick and place operations and tool use. Most grasp...
Jiaxin L. Fu, Nancy S. Pollard
CVPR
2009
IEEE
15 years 3 months ago
A Stereo Approach that Handles the Matting Problem via Image Warping
We propose an algorithm that simultaneously extracts disparities and alpha matting information given a stereo image pair. Our method divides the reference image into a set of ov...
Michael Bleyer (Vienna University of Technology), ...
COLCOM
2007
IEEE
14 years 3 months ago
Secure scripting based composite application development: Framework, architecture, and implementation
—Dynamic scripting languages such as Ruby provide language features that enable developers to express their intent more rapidly and with fewer expressions. Organizations started ...
Tom Dinkelaker, Alisdair Johnstone, Yücel Kar...