Sciweavers

2486 search results - page 124 / 498
» A Type System for Computationally Secure Information Flow
Sort
View
ICPR
2008
IEEE
14 years 10 months ago
Spatio-temporal 3D pose estimation and tracking of human body parts using the Shape Flow algorithm
In this contribution we introduce the Shape Flow algorithm (SF), a novel method for spatio-temporal 3D pose estimation of a 3D parametric curve. The SF is integrated into a tracki...
Markus Hahn, Lars Krüger, Christian Wöhl...
ACISP
1998
Springer
14 years 1 months ago
Meta Objects for Access Control: Role-Based Principals
Abstract. Most current object-based distributed systems support access control lists for access control. However, it is difficult to determine which principal information to use fo...
Thomas Riechmann, Jürgen Kleinöder
DAC
2006
ACM
14 years 10 months ago
Prediction-based flow control for network-on-chip traffic
Networks-on-Chip (NoC) architectures provide a scalable solution to on-chip communication problem but the bandwidth offered by NoCs can be utilized efficiently only in presence of...
Ümit Y. Ogras, Radu Marculescu
CASES
2008
ACM
13 years 11 months ago
Active control and digital rights management of integrated circuit IP cores
We introduce the first approach that can actively control multiple hardware intellectual property (IP) cores used in an integrated circuit (IC). The IP rights owner(s) can remotel...
Yousra Alkabani, Farinaz Koushanfar
JUCS
2010
159views more  JUCS 2010»
13 years 3 months ago
Developing a Secure Mobile Grid System through a UML Extension
: The idea of developing software through systematic development processes to improve software quality is not new. Nevertheless, there are still many information systems such as th...
David G. Rosado, Eduardo Fernández-Medina, ...