Sciweavers

1735 search results - page 283 / 347
» Using UML for Business Object Based Systems Modeling
Sort
View
SIGGRAPH
2010
ACM
14 years 1 months ago
Volume contact constraints at arbitrary resolution
We introduce a new method for simulating frictional contact between volumetric objects using interpenetration volume constraints. When applied to complex geometries, our formulati...
Jérémie Allard, François Faure, Hadrien Courtec...
SACMAT
2005
ACM
14 years 2 months ago
Peer-to-peer access control architecture using trusted computing technology
It has been recognized for some time that software alone does not provide an adequate foundation for building a high-assurance trusted platform. The emergence of industry-standard...
Ravi S. Sandhu, Xinwen Zhang
IJCAI
2007
13 years 10 months ago
A Fully Connectionist Model Generator for Covered First-Order Logic Programs
We present a fully connectionist system for the learning of first-order logic programs and the generation of corresponding models: Given a program and a set of training examples,...
Sebastian Bader, Pascal Hitzler, Steffen Höll...
VISAPP
2008
13 years 10 months ago
Towards the Estimation of Conspicuity with Visual Priors
Traffic signs are designed to be clearly seen by drivers. However a little is known about the visual influence of the traffic sign environment on how it will be perceived. Computer...
Ludovic Simon, Jean-Philippe Tarel, Roland Bremond
CONCURRENCY
2010
127views more  CONCURRENCY 2010»
13 years 9 months ago
Formation of virtual organizations in grids: a game-theoretic approach
Applications require the composition of resources to execute in a grid computing environment. The Grid Service Providers (GSPs), the owners of the computational resources, must for...
Thomas E. Carroll, Daniel Grosu