Sciweavers

107 search results - page 8 / 22
» Controlling Redundancy in Referring Expressions
Sort
View
AUTOMATICA
2007
113views more  AUTOMATICA 2007»
13 years 7 months ago
Correlation-based tuning of decoupling multivariable controllers
The iterative method labelled Correlation-based Tuning (CbT) is considered in this paper for tuning linear time-invariant multivariable controllers. The approach allows one to tun...
Ljubisa Miskovic, Alireza Karimi, Dominique Bonvin...
ICMI
2009
Springer
196views Biometrics» more  ICMI 2009»
13 years 5 months ago
Communicative gestures in coreference identification in multiparty meetings
During multiparty meetings, participants can use non-verbal modalities such as hand gestures to make reference to the shared environment. Therefore, one hypothesis is that incorpo...
Tyler Baldwin, Joyce Y. Chai, Katrin Kirchhoff
CCS
2007
ACM
14 years 1 months ago
Managing RBAC states with transitive relations
In this paper, we study the maintenance of role-based access control (RBAC) models in database environments using transitive closure relations. In particular, the algorithms that ...
Chaoyi Pang, David P. Hansen, Anthony J. Maeder
QSHINE
2005
IEEE
14 years 28 days ago
Adaptive Low-Complexity Erasure-Correcting Code-Based Protocols for QoS-Driven Mobile Multicast Services
—We propose an adaptive hybrid automatic repeat request–forward error correction (ARQ–FEC) erasure-correcting scheme for quality of service (QoS)-driven mobile multicast serv...
Qinghe Du, Xi Zhang
ASIAN
2007
Springer
129views Algorithms» more  ASIAN 2007»
13 years 11 months ago
An Integrated Model for Access Control and Information Flow Requirements
Current information systems are more and more complex. They require more interactions between different components and users. So, ensuring system security must not be limited to us...
Samiha Ayed, Nora Cuppens-Boulahia, Fréd&ea...