Sciweavers

484 search results - page 52 / 97
» A cost-oriented approach for infrastructural design
Sort
View
ACSAC
2002
IEEE
14 years 19 days ago
Malicious Code Detection for Open Firmware
Malicious boot firmware is a largely unrecognized but significant security risk to our global information infrastructure. Since boot firmware executes before the operating syst...
Frank Adelstein, Matthew Stillerman, Dexter Kozen
ACSAC
2000
IEEE
14 years 3 days ago
Extending Java for Package based Access Control
This paper describes an extension of the Java language that provides “programmable security.” The approach augments the Java syntax with constructs for specifying various acce...
John Hale, Mauricio Papa, Oliver Bremer, Rodrigo C...
CAPTECH
1998
Springer
13 years 12 months ago
A Robust Human-Silhouette Extraction Technique for Interactive Virtual Environments
In this paper, we present a method for robustly extracting the silhouette form of the participant within an interactive environment. The approach overcomes the inherent problems as...
James W. Davis, Aaron F. Bobick
GRID
2008
Springer
13 years 8 months ago
Pilot job accounting and auditing in Open Science Grid
The Grid accounting and auditing mechanisms were designed under the assumption that users would submit their jobs directly to the Grid gatekeepers. However, many groups are starti...
Igor Sfiligoi, Greg Quinn, Chris Green, Greg Thain
CORR
2004
Springer
103views Education» more  CORR 2004»
13 years 7 months ago
Towards a Model-Based Framework for Integrating Usability and Software Engineering Life Cycles
: In this position paper we propose a process model that provides a development infrastructure in which the usability engineering and software engineering life cycles co-exist in c...
Pardha S. Pyla, Manuel A. Pérez-Quiñ...