Sciweavers

2009 search results - page 271 / 402
» A privacy-aware access control system
Sort
View
BIS
2008
86views Business» more  BIS 2008»
13 years 11 months ago
Specifying Separation of Duty Constraints in BPEL4People Processes
Abstract. Security issues have to be carefully considered for information systems that support the business processes of an organization, in particular, when these systems build on...
Jan Mendling, Karsten Ploesser, Mark Strembeck
PST
2004
13 years 11 months ago
Structural Concepts for Trust, Contract and Security Management for a Virtual Chemical Engineering Organisation
The paper reports on ongoing research into the development of a management system to co-ordinate a set of activities of a virtual organisation for the production of chemicals. The...
Panayiotis Periorellis, Christopher J. W. Townson,...
TCSV
2008
120views more  TCSV 2008»
13 years 10 months ago
A Parallel Hardware Architecture for Scale and Rotation Invariant Feature Detection
Abstract--This paper proposes a parallel hardware architecture for image feature detection based on the SIFT (Scale Invariant Feature Transform) algorithm and applied to the SLAM (...
Vanderlei Bonato, Eduardo Marques, George A. Const...
VLDB
1990
ACM
126views Database» more  VLDB 1990»
14 years 2 months ago
Consistency of Versions in Object-Oriented Databases
This paper presents an approach to maintaining consistency of object versions in multiversion database systems. In this approach a multiversion database is considered to be a set ...
Wojciech Cellary, Geneviève Jomier
ATAL
2006
Springer
14 years 6 days ago
Autonomous agents for air-traffic deconfliction
This contribution presents a deployment exercise of multiagent technology in the domain of deconflicted air-traffic control among several autonomous aerial vehicles (manned as wel...
Michal Pechoucek, David Sislák, Dusan Pavl&...