Sciweavers

1897 search results - page 138 / 380
» eg 2007
Sort
View
ACSW
2006
14 years 1 days ago
A method for access authorisation through delegation networks
Owners of systems and resources usually want to control who can access them. This must be based on having a process for authorising certain parties, combined with mechanisms for e...
Audun Jøsang, Dieter Gollmann, Richard Au
BILDMED
2006
112views Algorithms» more  BILDMED 2006»
14 years 1 days ago
Extracting Consistent and Manifold Interfaces from Multi-valued Volume Data Sets
We propose an algorithm to construct a set of interfaces that separate the connected components of a multi-valued volume dataset. While each single interface is a manifold triangle...
Stephan Bischoff, Leif Kobbelt
BIOCOMP
2006
14 years 1 days ago
Theoretical Bounds for the Number of Inferable Edges in Sparse Random Networks
Abstract-- The inference of a network structure from experimental data providing dynamical information about the underlying system of investigation is an important and still outsta...
Frank Emmert-Streib, Matthias Dehmer
CLA
2006
14 years 1 days ago
Using FCA to Suggest Refactorings to Correct Design Defects
Abstract. Design defects are poor design choices resulting in a hard-tomaintain software, hence their detection and correction are key steps of a disciplined software process aimed...
Naouel Moha, Jihene Rezgui, Yann-Gaël Gu&eacu...
CLIMA
2006
14 years 1 days ago
Adding Evolving Abilities to a Multi-Agent System
This paper reports on a fertile marriage between madAgents, a Java and Prolog based multi-agent platform, and EVOLP, a logic programming based language to represent and reason abou...
João Leite, Luís Soares