Sciweavers

306 search results - page 35 / 62
» Fault-Tolerant Computation in the Full Information Model
Sort
View
IUI
2004
ACM
14 years 1 months ago
Handling device diversity through multi-level stylesheets
With the advent of in-home networking and ubiquitous computing, it becomes apparent that we have an increasing need for automatic adaptation of user interfaces to different device...
Walter Dees
CVPR
2006
IEEE
14 years 1 months ago
Robust multi-target tracking using spatio-temporal context
In multi-target tracking, the maintaining of the correct identity of targets is challenging. In the presented tracking method, accurate target identification is achieved by incor...
Hieu Tat Nguyen, Qiang Ji, Arnold W. M. Smeulders
BIRTHDAY
2010
Springer
13 years 9 months ago
DKAL and Z3: A Logic Embedding Experiment
Yuri Gurevich and Itay Neeman proposed the Distributed Knowledge Authorization Language, DKAL, as an expressive, yet very succinctly expressible logic for distributed authorization...
Sergio Mera, Nikolaj Bjørner
MM
2006
ACM
189views Multimedia» more  MM 2006»
14 years 1 months ago
Real-time computerized annotation of pictures
Automated annotation of digital pictures has been a highly challenging problem for computer scientists since the invention of computers. The capability of annotating pictures by c...
Jia Li, James Ze Wang
SACMAT
2009
ACM
14 years 2 months ago
Ensuring spatio-temporal access control for real-world applications
Traditional access control models, such as Role-Based Access Control (RBAC), do not take into account contextual information, such as location and time, for making access decision...
Manachai Toahchoodee, Indrakshi Ray, Kyriakos Anas...