Sciweavers

1627 search results - page 264 / 326
» On context in authorization policy
Sort
View
JASIS
2008
117views more  JASIS 2008»
13 years 8 months ago
Blind men and elephants: What do citation summaries tell us about a research article?
The old Asian legend about the blind men and the elephant comes to mind when looking at how different authors of scientific papers describe a piece of related prior work. It turns...
Aaron Elkiss, Siwei Shen, Anthony Fader, Güne...
CORR
2007
Springer
135views Education» more  CORR 2007»
13 years 8 months ago
The Unix KISS: A Case Study
In this paper we show that the initial philosophy used in designing and developing UNIX in early times has been forgotten due to “fast practices”. We question the leitmotif th...
Franco Milicchio
INFFUS
2007
117views more  INFFUS 2007»
13 years 8 months ago
Pixel-based and region-based image fusion schemes using ICA bases
The task of enhancing the perception of a scene by combining information captured by different sensors is usually known as image fusion. The pyramid decomposition and the Dual-Tr...
Nikolaos Mitianoudis, Tania Stathaki
TCS
2008
13 years 8 months ago
Extending FeatherTrait Java with Interfaces
In the context of Featherweight Java by Igarashi, Pierce, and Wadler, and its recent extension FeatherTrait Java (FTJ) by the authors, we investigate classes that can be extended ...
Luigi Liquori, Arnaud Spiwack
TCS
2008
13 years 8 months ago
Quasiperiodic and Lyndon episturmian words
Recently the second two authors characterized quasiperiodic Sturmian words, proving that a Sturmian word is non-quasiperiodic if and only if it is an infinite Lyndon word. Here we...
Amy Glen, Florence Levé, Gwénaë...