Sciweavers

16843 search results - page 89 / 3369
» On Generalized Authorization Problems
Sort
View
APPML
2008
86views more  APPML 2008»
13 years 8 months ago
A periodic boundary value problem with vanishing Green's function
In this work, the authors consider the boundary value problem y + a(t)y = g(t) f (y), 0 t 2, y(0) = y(2), y (0) = y (2), and establish the existence of nonnegative solutions in ...
John R. Graef, Lingju Kong, Haiyan Wang
I3
2007
13 years 9 months ago
Identity: How to name it, How to find it
The main objective of this work is to exploit the relationship between the information findability problem and a subject-based organization of information. Identification of a sub...
Christo Dichev, Darina Dicheva, Jan Fischer
DEXAW
2008
IEEE
126views Database» more  DEXAW 2008»
13 years 10 months ago
Meta Analysis within Authorship Verification
In an authorship verification problem one is given writing examples from an author A, and one is asked to determine whether or not each text in fact was written by A. In a more ge...
Benno Stein, Nedim Lipka, Sven Meyer zu Eissen
CANDC
2009
ACM
14 years 2 months ago
Visualization and empowerment
Data visualization, commonly used to make large sets of numerical data more legible, also has enormous potential as a storytelling tool to elicit insights on long-standing social ...
Indhira Rojas, Wendy Ju
SOUPS
2006
ACM
14 years 2 months ago
Aligning usability and security: a usability study of Polaris
Security software is often difficult to use thus leading to poor adoption and degraded security. This paper describes a usability study that was conducted on the software ‘Polar...
Alexander J. DeWitt, Jasna Kuljis