Sciweavers

378 search results - page 57 / 76
» How Many Ways Can One Draw a Graph
Sort
View
HICSS
2003
IEEE
116views Biometrics» more  HICSS 2003»
15 years 8 months ago
Research on Task Complexity as a Foundation for Augmented Cognition
In order to implement real-time adaptive augmented cognition, one of the focal points of our present research involves understanding the dimensions of task complexity. Task comple...
Martha E. Crosby, Marie Iding, David N. Chin
SIGMOD
2009
ACM
185views Database» more  SIGMOD 2009»
16 years 3 months ago
Attacks on privacy and deFinetti's theorem
In this paper we present a method for reasoning about privacy using the concepts of exchangeability and deFinetti's theorem. We illustrate the usefulness of this technique by...
Daniel Kifer
102
Voted
HICSS
2007
IEEE
85views Biometrics» more  HICSS 2007»
15 years 9 months ago
A Program of Study of the Use of Stories in DSS
Storytelling is an innate human characteristic. Stories are used to manage meaning, control behavior, and facilitate identification and bonding [9]. The theory of identification a...
David B. Paradice
127
Voted
ICRA
2007
IEEE
227views Robotics» more  ICRA 2007»
15 years 9 months ago
Inverse Dynamics Control with Floating Base and Constraints
— In this paper, we address the issues of compliant control of a robot under contact constraints with a goal of using joint space based pattern generators as movement primitives,...
Jun Nakanishi, Michael Mistry, Stefan Schaal
117
Voted
CSFW
2006
IEEE
15 years 9 months ago
Policy Analysis for Administrative Role Based Access Control
Role-Based Access Control (RBAC) is a widely used model for expressing access control policies. In large organizations, the RBAC policy may be collectively managed by many adminis...
Amit Sasturkar, Ping Yang, Scott D. Stoller, C. R....