Sciweavers

575 search results - page 85 / 115
» A Trust Analysis Methodology for Pervasive Computing Systems
Sort
View
SAC
2005
ACM
14 years 1 months ago
An attribute-based access matrix model
In traditional access control models like MAC, DAC, and RBAC, authorization decisions are determined according to identities of subjects and objects, which are authenticated by a ...
Xinwen Zhang, Yingjiu Li, Divya Nalla
ICCS
2009
Springer
14 years 2 months ago
Access Policy Design Supported by FCA Methods
Role Based Access Control (RBAC) is a methodology for providing users in an IT system specific permissions like write or read to t abstracts from specific users and binds permiss...
Frithjof Dau, Martin Knechtel
NPAR
2000
ACM
14 years 1 days ago
Performance-driven hand-drawn animation
We present a novel method for generating performance-driven, “hand-drawn” animation in real-time. Given an annotated set of hand-drawn faces for various expressions, our algor...
Ian Buck, Adam Finkelstein, Charles E. Jacobs, All...
ECCV
2004
Springer
14 years 1 months ago
Statistical Imaging for Modeling and Identification of Bacterial Types
An automatic tool is developed to identify microbiological data types using computer-vision and statistical modeling techniques. In bacteriophage (phage) typing, representative pro...
Sigal Trattner, Hayit Greenspan, Gabi Tepper, Shim...
SIGCOMM
2004
ACM
14 years 1 months ago
Locating internet routing instabilities
This paper presents a methodology for identifying the autonomous system (or systems) responsible when a routing change is observed and propagated by BGP. The origin of such a rout...
Anja Feldmann, Olaf Maennel, Zhuoqing Morley Mao, ...