Sciweavers

653 search results - page 40 / 131
» Addressing interoperability issues in access control models
Sort
View
ADC
2009
Springer
122views Database» more  ADC 2009»
14 years 2 months ago
What is Required in Business Collaboration?
Access control has been studied for sometime, and there are a number of theories and techniques for handling access control for single or centralised systems; however, unique and ...
Daisy Daiqin He, Michael Compton, Kerry Taylor, Ji...
CCS
2004
ACM
14 years 1 months ago
MAC and UML for secure software design
Security must be a first class citizen in the design of large scale, interacting, software applications, at early and all stages of the lifecycle, for accurate and precise policy ...
Thuong Doan, Steven A. Demurjian, T. C. Ting, Andr...
ICIP
1998
IEEE
14 years 9 months ago
A Deformable Model for Human Organ Extraction
We present a modi cation of the well-known snakes algorithm for extracting contours in noisy images. Our modi cation addresses the issues of selection of the control points on an ...
Jean Gao, Akio Kosaka, Avinash C. Kak
CBSE
2005
Springer
14 years 1 months ago
Performance Prediction of J2EE Applications Using Messaging Protocols
Abstract. Predicting the performance of component-based applications is difficult due to the complexity of the underlying component technology. This problem is exacerbated when a m...
Yan Liu, Ian Gorton
MTA
2010
101views more  MTA 2010»
13 years 6 months ago
Enquiring MPEG-7 based multimedia ontologies
Machine understandable metadata forms the main prerequisite for the intelligent services envisaged in a Web, which going beyond mere data exchange and provides for effective conten...
Stamatia Dasiopoulou, Vassilis Tzouvaras, Ioannis ...