Sciweavers

2016 search results - page 345 / 404
» Megamaps: Construction and Examples
Sort
View
CSFW
2006
IEEE
14 years 3 months ago
Encoding Information Flow in Haskell
This paper presents an embedded security sublanguage for enforcing information-flow policies in the standard Haskell programming language. The sublanguage provides useful informa...
Peng Li, Steve Zdancewic
FGR
2006
IEEE
135views Biometrics» more  FGR 2006»
14 years 3 months ago
Adding Holistic Dimensions to a Facial Composite System
Facial composites are typically constructed by witnesses to crime by describing a suspect's face and then selecting facial features from a kit of parts. Unfortunately, when p...
Charlie D. Frowd, Vicki Bruce, Alex H. McIntyre, P...
GLOBECOM
2006
IEEE
14 years 3 months ago
Position-based Routing using Virtual Small World in MANETs
— Routing is the foremost issue in mobile ad hoc networks (MANETs), In a wireless environment characterized by small bandwidth and limited computation resources, positionbased ro...
Cong Liu, Jie Wu
HICSS
2006
IEEE
155views Biometrics» more  HICSS 2006»
14 years 3 months ago
Contextualizing Knowledge Management Readiness to Support Change Management Strategies
Research on knowledge management (KM) readiness has matured. However, recent organizational structures have emerged which prevent traditional instruments from adequately measuring...
Mark Keith, Michael Goul, Haluk Demirkan, Jason Ni...
ICRA
2006
IEEE
104views Robotics» more  ICRA 2006»
14 years 3 months ago
Graphical Singularity Analysis of Planar Parallel Manipulators
- This paper introduces a new approach to identify singularities of planar parallel manipulators (PPMs). This method is based on Maxwell’s reciprocal figure theory which establis...
Amir Degani, Alon Wolf