Sciweavers

4201 search results - page 99 / 841
» Our Users have Root!
Sort
View
JHSN
2006
267views more  JHSN 2006»
13 years 8 months ago
Client-side access control enforcement using trusted computing and PEI models
It has been recognized for some time that software alone does not provide an adequate foundation for building a high-assurance trusted platform. The emergence of industry-standard ...
Ravi S. Sandhu, Xinwen Zhang, Kumar Ranganathan, M...
TOG
2008
114views more  TOG 2008»
13 years 8 months ago
Single image tree modeling
In this paper, we introduce a simple sketching method to generate a realistic 3D tree model from a single image. The user draws at least two strokes in the tree image: the first c...
Ping Tan, Tian Fang, Jianxiong Xiao, Peng Zhao, Lo...
MBUI
2004
104views User Interface» more  MBUI 2004»
13 years 9 months ago
An EUD Approach for Making MBUI Practical
In this paper, we present our perspective on Model-Based User Interfaces (hereafter MBUI) paradigm and provide with our experience in this area combining high-level knowledge-base...
José A. Macías, Pablo Castells
WWW
2011
ACM
13 years 3 months ago
Context-sensitive query auto-completion
Query auto completion is known to provide poor predictions of the user’s query when her input prefix is very short (e.g., one or two characters). In this paper we show that con...
Ziv Bar-Yossef, Naama Kraus
ICALP
2005
Springer
14 years 1 months ago
The Tree Inclusion Problem: In Optimal Space and Faster
Given two rooted, ordered, and labeled trees P and T the tree inclusion problem is to determine if P can be obtained from T by deleting nodes in T. This problem has recently been r...
Philip Bille, Inge Li Gørtz