Sciweavers

10263 search results - page 1927 / 2053
» From Use Cases to System Operation Specifications
Sort
View
ICPR
2000
IEEE
14 years 10 months ago
A Quick 3D-2D Registration Method for a Wide-Range of Applications
Amethod for quick determination of the position and pose of a 3D free-form object with respect to its 2D projective image(s) is proposed. It is a precondition of the method that a...
Yasuyo Kita, Nobuyuki Kita, Dale L. Wilson, J. Ali...
CHI
2010
ACM
14 years 3 months ago
SensorTune: a mobile auditory interface for DIY wireless sensor networks
Wireless Sensor Networks (WSNs) allow the monitoring of activity or environmental conditions over a large area, from homes to industrial plants, from agriculture fields to forest...
Enrico Costanza, Jacques Panchard, Guillaume Zuffe...
COCOON
2009
Springer
14 years 3 months ago
On the Performances of Nash Equilibria in Isolation Games
: Network games play a fundamental role in understanding behavior in many domains, ranging from communication networks through markets to social networks. Such networks are used, a...
Vittorio Bilò, Michele Flammini, Gianpiero ...
CCS
2007
ACM
14 years 3 months ago
Managing RBAC states with transitive relations
In this paper, we study the maintenance of role-based access control (RBAC) models in database environments using transitive closure relations. In particular, the algorithms that ...
Chaoyi Pang, David P. Hansen, Anthony J. Maeder
SIGSOFT
2007
ACM
14 years 9 months ago
Quantitative verification: models techniques and tools
Automated verification is a technique for establishing if certain properties, usually expressed in temporal logic, hold for a system model. The model can be defined using a high-l...
Marta Z. Kwiatkowska
« Prev « First page 1927 / 2053 Last » Next »