Sciweavers

1286 search results - page 196 / 258
» A Practical Modelling Notation for Secure Distributed Comput...
Sort
View
107
Voted
HUC
2005
Springer
15 years 8 months ago
Fast and Robust Interface Generation for Ubiquitous Applications
Abstract. We present Supple, a novel toolkit which automatically generates interfaces for ubiquitous applications. Designers need only specify declarative models of the interface a...
Krzysztof Gajos, David B. Christianson, Raphael Ho...
150
Voted
ESCIENCE
2006
IEEE
15 years 6 months ago
Scientific Workflows: More e-Science Mileage from Cyberinfrastructure
We view scientific workflows as the domain scientist's way to harness cyberinfrastructure for e-Science. Domain scientists are often interested in "end-to-end" fram...
Bertram Ludäscher, Shawn Bowers, Timothy M. M...
145
Voted
ICCV
2011
IEEE
14 years 2 months ago
Real-time Indoor Scene Understanding using Bayesian Filtering with Motion Cues
We present a method whereby an embodied agent using visual perception can efficiently create a model of a local indoor environment from its experience of moving within it. Our me...
Grace Tsai, Changhai Xu, Jingen Liu, Benjamin Kuip...
142
Voted
ESORICS
2004
Springer
15 years 8 months ago
Signature Bouquets: Immutability for Aggregated/Condensed Signatures
Database outsourcing is a popular industry trend which involves organizations delegating their data management needs to an external service provider. In this model, a service prov...
Einar Mykletun, Maithili Narasimha, Gene Tsudik
SACMAT
2009
ACM
15 years 7 months ago
A formal framework to elicit roles with business meaning in RBAC systems
The role-based access control (RBAC) model has proven to be cost effective to reduce the complexity and costs of access permission management. To maximize the advantages offered...
Alessandro Colantonio, Roberto Di Pietro, Alberto ...