Sciweavers

1274 search results - page 191 / 255
» Graph lambda theories
Sort
View
DBSEC
2009
163views Database» more  DBSEC 2009»
13 years 10 months ago
A Trust-Based Access Control Model for Pervasive Computing Applications
With the rapid growth in wireless networks and sensor and mobile devices, we are moving towards an era of pervasive computing. Access control is challenging in these environments. ...
Manachai Toahchoodee, Ramadan Abdunabi, Indrakshi ...
DGO
2009
139views Education» more  DGO 2009»
13 years 10 months ago
Citation analysis for e-government research
Various research papers question and analyze the maturity of the e-government research area and its stance as a scientific discipline. The common conclusion of these papers is the...
Nusa Erman
CVPR
2010
IEEE
13 years 9 months ago
Multi-view structure computation without explicitly estimating motion
Most existing structure-from-motion methods follow a common two-step scheme, where relative camera motions are estimated in the first step and 3D structure is computed afterward ...
Hongdong Li
AUTOMATICA
2008
92views more  AUTOMATICA 2008»
13 years 9 months ago
Generic uniform observability analysis for bilinear systems
In this paper, we study the property of generic uniform observability for structured bilinear systems. More precisely, to check whether or not a structured bilinear system generic...
T. Boukhobza
CORR
2010
Springer
124views Education» more  CORR 2010»
13 years 9 months ago
Symmetry within and between solutions
Symmetry can be used to help solve many problems. For instance, Einstein's famous 1905 paper ("On the Electrodynamics of Moving Bodies") uses symmetry to help derive...
Toby Walsh