Sciweavers

3926 search results - page 647 / 786
» Deriving Information Requirements from Responsibility Models
Sort
View
SPC
2005
Springer
15 years 10 months ago
TrustAC: Trust-Based Access Control for Pervasive Devices
Alice first meets Bob in an entertainment shop, then, they wish to share multimedia content, but Do they know what are trustworthy users? How do they share such information in a s...
Florina Almenárez Mendoza, Andrés Ma...
FPL
2003
Springer
259views Hardware» more  FPL 2003»
15 years 10 months ago
Branch Optimisation Techniques for Hardware Compilation
Abstract. This paper explores using information about program branch probabilities to optimise reconfigurable designs. The basic premise is to promote utilization by dedicating mo...
Henry Styles, Wayne Luk
HIM
1997
Springer
169views Multimedia» more  HIM 1997»
15 years 8 months ago
High Precision Hypertext Navigation Based on NLP Automatic Extractions
The growing popularity of hypertext navigation systems and the availability of large documentary databases is leading to the design of navigation systems that allow to explore the...
Frantz Vichot, Francis Wolinski, Joseph Tomeh, Syl...
IEEECIT
2010
IEEE
15 years 3 months ago
Research on PID Control Algorithm of BP Network based on Two Axis Digital Control Turntable
under the research context of two axis digital control turntable, this paper has set up a mathematical model of control system of turntables. Proceeding from such model, it has ma...
Jie Hao, Wenxiang Zhang, Mingqing Ling
CORR
2011
Springer
172views Education» more  CORR 2011»
14 years 8 months ago
Uncovering the Temporal Dynamics of Diffusion Networks
Time plays an essential role in the diffusion of information, influence and disease over networks. In many cases we only observe when a node copies information, makes a decision ...
Manuel Gomez-Rodriguez, David Balduzzi, Bernhard S...