Sciweavers

357 search results - page 57 / 72
» A logic-based framework for attribute based access control
Sort
View
GEOINFORMATICA
2008
135views more  GEOINFORMATICA 2008»
13 years 7 months ago
Automatically and Accurately Conflating Raster Maps with Orthoimagery
Recent growth of geospatial information online has made it possible to access various maps and orthoimagery. Conflating these maps and imagery can create images that combine the vi...
Ching-Chien Chen, Craig A. Knoblock, Cyrus Shahabi
PIMRC
2010
IEEE
13 years 5 months ago
A fair and Adaptive Contention Resolution Algorithm for time-slotted MAC protocol designs
Abstract--This paper addresses the fairness of Medium Access Control (MAC) protocols that are capable of handling interference on the physical layer to a varying extent. The variat...
Ulrike Korger, Yingrui Chen, Christian Hartmann, K...
OOPSLA
2004
Springer
14 years 26 days ago
Transparent proxies for java futures
A proxy object is a surrogate or placeholder that controls access to another target object. Proxies can be used to support distributed programming, lazy or parallel evaluation, ac...
Polyvios Pratikakis, Jaime Spacco, Michael W. Hick...
AVI
2008
13 years 9 months ago
Agent warp engine: formula based shape warping for networked applications
Computer visualization and networking have advanced dramatically over the last few years, partially driven by the exploding video game market. 3D hardware acceleration has reached...
Alexander Repenning, Andri Ioannidou
APWEB
2011
Springer
12 years 11 months ago
SecGuard: Secure and Practical Integrity Protection Model for Operating Systems
Host compromise is a serious security problem for operating systems. Most previous solutions based on integrity protection models are difficult to use; on the other hand, usable i...
Ennan Zhai, Qingni Shen, Yonggang Wang, Tao Yang, ...