Sciweavers

306 search results - page 29 / 62
» Fault-Tolerant Computation in the Full Information Model
Sort
View
CCS
2004
ACM
14 years 1 months ago
Comparing the expressive power of access control models
Comparing the expressive power of access control models is recognized as a fundamental problem in computer security. Such comparisons are generally based on simulations between di...
Mahesh V. Tripunitara, Ninghui Li
DAGM
2010
Springer
13 years 5 months ago
3D Reconstruction Using an n-Layer Heightmap
We present a novel method for 3D reconstruction of urban scenes extending a recently introduced heightmap model. Our model has several advantages for 3D modeling of urban scenes: i...
David Gallup, Marc Pollefeys, Jan-Michael Frahm
SIGIR
2011
ACM
12 years 10 months ago
Fast context-aware recommendations with factorization machines
The situation in which a choice is made is an important information for recommender systems. Context-aware recommenders take this information into account to make predictions. So ...
Steffen Rendle, Zeno Gantner, Christoph Freudentha...
JCD
2000
72views more  JCD 2000»
13 years 7 months ago
Participating from the sidelines, online: facilitating telementoring projects
Asynchronous, text-based communication is different from most other forms of interchange in important ways. It lacks the full spectrum of visual and audible information that peopl...
Judith B. Harris, Candace Figg
EFDBS
2003
13 years 9 months ago
Implementing Mediators through Virtual Updateable Views
Mediators are considered basic architectural units for integration of distributed, heterogeneous information resources. In the paper we propose powerful virtual updateable views as...
Hanna Kozankiewicz, Jacek Leszczylowski, Kazimierz...