Sciweavers

2043 search results - page 370 / 409
» Reasoning About Security Models
Sort
View
ISM
2008
IEEE
101views Multimedia» more  ISM 2008»
14 years 4 months ago
Photo Context as a Bag of Words
In the recent years, photo context metadata (e.g., date, GPS coordinates) have been proved to be useful in the management of personal photos. However, these metadata are still poo...
Windson Viana, Samira Hammiche, Marlène Vil...
HPDC
2006
IEEE
14 years 4 months ago
Filecules in High-Energy Physics: Characteristics and Impact on Resource Management
Grid computing has reached the stage where deployments are mature and many collaborations run in production mode. Mature Grid deployments offer the opportunity for revisiting and ...
Adriana Iamnitchi, Shyamala Doraimani, Gabriele Ga...
DALT
2005
Springer
14 years 3 months ago
Complete Axiomatizations of Finite Syntactic Epistemic States
An agent who bases his actions upon explicit logical formulae has at any given point in time a finite set of formulae he has computed. Closure or consistency conditions on this se...
Thomas Ågotnes, Michal Walicki
RULEML
2005
Springer
14 years 3 months ago
Active Rules in the Semantic Web: Dealing with Language Heterogeneity
In the same way as the “static” Semantic Web deals with data model and language heterogeneity and semantics that lead to RDF and OWL, there is language heterogeneity and the ne...
Wolfgang May, José Júlio Alferes, Ri...
ICMI
2004
Springer
152views Biometrics» more  ICMI 2004»
14 years 3 months ago
Exploiting prosodic structuring of coverbal gesticulation
Although gesture recognition has been studied extensively, communicative, affective, and biometrical “utility” of natural gesticulation remains relatively unexplored. One of t...
Sanshzar Kettebekov