Sciweavers

158 search results - page 26 / 32
» An Attribute Based Framework for Risk-Adaptive Access Contro...
Sort
View
CGF
2006
263views more  CGF 2006»
13 years 7 months ago
A Predictive Light Transport Model for the Human Iris
Recently, light interactions with organic matter have become the object of detailed investigations by image synthesis researchers. Besides allowing these materials to be rendered ...
Michael W. Y. Lam, Gladimir V. G. Baranoski
JSAC
2007
130views more  JSAC 2007»
13 years 7 months ago
Cross-layer QoS Analysis of Opportunistic OFDM-TDMA and OFDMA Networks
Abstract— Performance analysis of multiuser orthogonal frequency division multiplexing (OFDM-TDMA) and orthogonal frequency division multiple access (OFDMA) networks in support o...
Yu-Jung Chang, Feng-Tsun Chien, C. C. Jay Kuo
DSONLINE
2006
79views more  DSONLINE 2006»
13 years 7 months ago
Integrating Security Policies via Container Portable Interceptors
In the past, it was very common to develop middleware without consideration of security from the very beginning. To integrate security, the middleware that should be protected has...
Tom Ritter, Rudolf Schreiner, Ulrich Lang
AVI
2008
13 years 9 months ago
Agent warp engine: formula based shape warping for networked applications
Computer visualization and networking have advanced dramatically over the last few years, partially driven by the exploding video game market. 3D hardware acceleration has reached...
Alexander Repenning, Andri Ioannidou
HIPEAC
2005
Springer
14 years 1 months ago
Memory-Centric Security Architecture
Abstract. This paper presents a new security architecture for protecting software confidentiality and integrity. Different from the previous process-centric systems designed for ...
Weidong Shi, Chenghuai Lu, Hsien-Hsin S. Lee