Sciweavers

499 search results - page 32 / 100
» An Integrated Model for Access Control and Information Flow ...
Sort
View
ICANN
2007
Springer
14 years 4 months ago
Neural Mechanisms for Mid-Level Optical Flow Pattern Detection
This paper describes a new model for extracting large-field optical flow patterns to generate distributed representations of neural activation to control complex visual tasks such ...
Stefan Ringbauer, Pierre Bayerl, Heiko Neumann
ATAL
2008
Springer
14 years 12 days ago
Regulating air traffic flow with coupled agents
The ability to provide flexible, automated management of air traffic is critical to meeting the ever increasing needs of the next generation air transportation systems. This probl...
Adrian K. Agogino, Kagan Tumer
BPM
2006
Springer
149views Business» more  BPM 2006»
14 years 11 days ago
Verifying BPEL Workflows Under Authorisation Constraints
Abstract. Business Process Execution Language (BPEL), or Web Services BPEL (WS-BPEL), is the standard for specifying workflow process definition using web services. Research on for...
Zhao Xiangpeng, Antonio Cerone, Padmanabhan Krishn...
SACMAT
2005
ACM
14 years 4 months ago
Peer-to-peer access control architecture using trusted computing technology
It has been recognized for some time that software alone does not provide an adequate foundation for building a high-assurance trusted platform. The emergence of industry-standard...
Ravi S. Sandhu, Xinwen Zhang
CCS
2008
ACM
14 years 11 days ago
SOMA: mutual approval for included content in web pages
Unrestricted information flows are a key security weakness of current web design. Cross-site scripting, cross-site request forgery, and other attacks typically require that inform...
Terri Oda, Glenn Wurster, Paul C. van Oorschot, An...