Sciweavers

811 search results - page 126 / 163
» Modeling and Virtualization for Secure Computing Environment...
Sort
View
MOBILITY
2009
ACM
14 years 1 months ago
Context-sensitive authorization in interaction patterns
Main requirement of recent computing environments, like mobile and then ubiquitous computing, is to adapt applications to context. On the other hand, access control generally trus...
Vincent Hourdin, Jean-Yves Tigli, Stephane Lavirot...
ITS
2000
Springer
140views Multimedia» more  ITS 2000»
14 years 9 days ago
Multi-agent Negotiation to Support an Economy for Online Help and Tutoring
We are designing a computational architecture for a "learning economy" based on personal software agents who represent users in a virtual society and assist them in find...
Chhaya Mudgal, Julita Vassileva
SAC
2009
ACM
14 years 3 months ago
An implementation substrate for languages composing modularized crosscutting concerns
We present the implementation of several programming languages with support for multi-dimensional separation of concerns (MDSOC) on top of a common delegation-based substrate, whi...
Hans Schippers, Michael Haupt, Robert Hirschfeld
UIC
2007
Springer
14 years 2 months ago
Activity Recognition Using an Egocentric Perspective of Everyday Objects
This paper presents an activity recognition approach based on the tracking of a specific human actor’s current object manipulation actions, complemented by two kinds of situation...
Dipak Surie, Thomas Pederson, Fabien Lagriffoul, L...
ICMCS
2006
IEEE
243views Multimedia» more  ICMCS 2006»
14 years 2 months ago
A Comparison of Three 3-D Facial Reconstruction Approaches
We compare three Computer Vision approaches to 3-D reconstruction, namely passive Binocular Stereo and active Structured Lighting and Photometric Stereo, in application to human f...
Alexander Woodward, Da An, Georgy L. Gimel'farb, P...