Sciweavers

636 search results - page 105 / 128
» The AXML Artifact Model
Sort
View
SP
1998
IEEE
106views Security Privacy» more  SP 1998»
13 years 12 months ago
Understanding Java Stack Inspection
Current implementations of Java make security decisions by searching the runtime call stack. These systems have attractive security properties, but they have been criticized as be...
Dan S. Wallach, Edward W. Felten
CHI
1998
ACM
13 years 12 months ago
Cognitive Function Analysis for Human-Centered Automation of Safety-Critical Systems
The Cognitive Function Analysis is a methodology supportedby a mediating tool for the human-centered automationof safety-critical systems[4]. It is basedon a socio-cognitive model...
Guy A. Boy
GIS
1998
ACM
13 years 12 months ago
Greedy Cuts: An Advancing Front Terrain Triangulation Algorithm
We apply an advancing front technique to the problem of simplification of dense digitized terrain models. While most simplification algorithms have been based on either incrementa...
Cláudio T. Silva, Joseph S. B. Mitchell
ACMDIS
1997
ACM
13 years 12 months ago
HCI, Natural Science and Design: A Framework for Triangulation Across Disciplines
Human-computer interaction is multidisciplinary, drawing paradigms and techniques from both the natural sciences and the design disciplines. HCI cannot be considered a pure natura...
Wendy E. Mackay, Anne-Laure Fayard
ECCV
2010
Springer
13 years 11 months ago
Lighting and Pose Robust Face Sketch Synthesis
Automatic face sketch synthesis has important applications in law enforcement and digital entertainment. Although great progress has been made in recent years, previous methods onl...