Sciweavers

2009 search results - page 298 / 402
» A privacy-aware access control system
Sort
View
ESORICS
2004
Springer
14 years 3 months ago
Parameterized Authentication
We describe an approach to sensor-based authentication that can adapt to accommodate incomplete, unreliable, or inaccurate input provided to the system. Parameterized Authenticatio...
Michael J. Covington, Mustaque Ahamad, Irfan A. Es...
ISW
2004
Springer
14 years 3 months ago
A Distributed High Assurance Reference Monitor
Abstract Ajay Chander1 , Drew Dean2 , and John Mitchell3 1 DoCoMo Communications Laboratories USA, San Jose, CA 95110 2 Computer Science Laboratory, SRI International, Menlo Park, ...
Ajay Chander, Drew Dean, John C. Mitchell
ISORC
2002
IEEE
14 years 3 months ago
Service Differentiation in Real-Time Main Memory Databases
The demand for real-time database services has been increasing recently. Examples include sensor data fusion, stock trading, decision support, web information services, and data-i...
Kyoung-Don Kang, Sang Hyuk Son, John A. Stankovic
VISUALIZATION
1998
IEEE
14 years 2 months ago
Large scale terrain visualization using the restricted quadtree triangulation
Real-time rendering of triangulated surfaces has attracted growing interest in the last few years. However, interactive visualization of very large scale grid digital elevation mo...
Renato Pajarola
VLDB
1997
ACM
103views Database» more  VLDB 1997»
14 years 2 months ago
Incremental Organization for Data Recording and Warehousing
Data warehouses and recording systems typically have a large continuous stream of incoming data, that must be stored in a manner suitable for future access. Access to stored recor...
H. V. Jagadish, P. P. S. Narayan, S. Seshadri, S. ...