Sciweavers

71 search results - page 9 / 15
» On Tamper-Resistance from a Theoretical Viewpoint
Sort
View
ISF
2008
104views more  ISF 2008»
13 years 7 months ago
An integrative model of trust on IT outsourcing: Examining a bilateral perspective
Trust has been considered a central aspect of successful IT outsourcing from the beginning of the outsourcing relationship to the end. A great deal of interest in trust has been d...
Jae-Nam Lee, Minh Q. Huynh, Rudy Hirschheim
ICCV
2007
IEEE
14 years 9 months ago
Half Quadratic Analysis for Mean Shift: with Extension to A Sequential Data Mode-Seeking Method
Theoretical understanding and extension of mean shift procedure has received much attention recently [8, 18, 3]. In this paper, we present a theoretical exploration and an algorit...
Xiaotong Yuan, Stan Z. Li
ICTAI
2009
IEEE
13 years 5 months ago
A Generalized Cyclic-Clustering Approach for Solving Structured CSPs
We propose a new method for solving structured CSPs which generalizes and improves the Cyclic-Clustering approach [4]. First, the cutset and the tree-decomposition of the constrai...
Cédric Pinto, Cyril Terrioux
HT
2003
ACM
14 years 23 days ago
Which semantic web?
Through scenarios in the popular press and technical papers in the research literature, the promise of the Semantic Web has raised a number of different expectations. These expect...
Catherine C. Marshall, Frank M. Shipman III
TCS
2010
13 years 2 months ago
Combinatorics of labelling in higher-dimensional automata
The main idea for interpreting concurrent processes as labelled precubical sets is that a given set of n actions running concurrently must be assembled to a labelled ncube, in exac...
Philippe Gaucher