Sciweavers

655 search results - page 26 / 131
» Using the Relational Model to Capture Topological Informatio...
Sort
View
OTM
2005
Springer
14 years 2 months ago
Modelling Context Information with ORM
Context-aware applications rely on implicit forms of input, such as sensor-derived data, in order to reduce the need for explicit input from users. They are especially relevant for...
Karen Henricksen, Jadwiga Indulska, Ted McFadden
CSFW
1999
IEEE
14 years 1 months ago
Athena: A New Efficient Automatic Checker for Security Protocol Analysis
We propose an efficient automatic checking algorithm, Athena, for analyzing security protocols. Athena incorporates a logic that can express security properties including authenti...
Dawn Xiaodong Song
PAMI
2006
233views more  PAMI 2006»
13 years 9 months ago
Model-Based Hand Tracking Using a Hierarchical Bayesian Filter
This paper sets out a tracking framework, which is applied to the recovery of threedimensional hand motion from an image sequence. The method handles the issues of initialization,...
Björn Stenger, Arasanathan Thayananthan, Phil...
ICPADS
2006
IEEE
14 years 3 months ago
The Impact of Information Availability and Workload Characteristics on the Performance of Job Co-allocation in Multi-clusters
In this paper, we utilize a bandwidth-centric job communication model that captures the interaction and impact of simultaneously co-allocating jobs across multiple clusters. We ma...
William M. Jones, Walter B. Ligon III, Nishant Shr...
IDEAS
2009
IEEE
104views Database» more  IDEAS 2009»
14 years 3 months ago
An organizational file permission management system using the cellular data system
In designing dynamic situations such as cyberworlds, we the Incrementally Modular Abstraction Hierarchy (IMAH) to be an appropriate mathematical background to model dynamically ch...
Toshio Kodama, Tosiyasu L. Kunii, Yoichi Seki