Sciweavers

2261 search results - page 398 / 453
» Dynamic types for authentication
Sort
View
JCDL
2010
ACM
199views Education» more  JCDL 2010»
14 years 1 months ago
Crowdsourcing the assembly of concept hierarchies
The“wisdom of crowds”is accomplishing tasks that are cumbersome for individuals yet cannot be fully automated by means of specialized computer algorithms. One such task is the...
Kai Eckert, Mathias Niepert, Christof Niemann, Cam...
CIKM
2000
Springer
14 years 1 months ago
Dimensionality Reduction and Similarity Computation by Inner Product Approximations
—As databases increasingly integrate different types of information such as multimedia, spatial, time-series, and scientific data, it becomes necessary to support efficient retri...
Ömer Egecioglu, Hakan Ferhatosmanoglu
ACSAC
1999
IEEE
14 years 1 months ago
A Prototype Secure Workflow Server
Workflow systems provide automated support that enables organizations to efficiently and reliably move important data through their routine business processes. For some organizati...
Douglas L. Long, Julie Baker, Francis Fung
DAC
1997
ACM
14 years 29 days ago
COSYN: Hardware-Software Co-Synthesis of Embedded Systems
: Hardware-software co-synthesis is the process of partitioning an embedded system specification into hardware and software modules to meet performance, power and cost goals. In t...
Bharat P. Dave, Ganesh Lakshminarayana, Niraj K. J...
SIGGRAPH
1997
ACM
14 years 29 days ago
Rendering with coherent layers
For decades, animated cartoons and movie special effects have factored the rendering of a scene into layers that are updated independently and composed in the final display. We ap...
Jed Lengyel, John Snyder