Sciweavers

1459 search results - page 282 / 292
» An authorization model for temporal data
Sort
View
ESCIENCE
2007
IEEE
15 years 10 months ago
Distributed and Generic Maximum Likelihood Evaluation
This paper presents GMLE 1 , a generic and distributed framework for maximum likelihood evaluation. GMLE is currently being applied to astroinformatics for determining the shape o...
Travis J. Desell, Nathan Cole, Malik Magdon-Ismail...
176
Voted
ICSOC
2004
Springer
15 years 9 months ago
An OGSA-based accounting system for allocation enforcement across HPC centers
In this paper, we present an Open Grid Services Architecture (OGSA)-based decentralized allocation enforcement system, developed with an emphasis on a consistent data model and ea...
Thomas Sandholm, Peter Gardfjäll, Erik Elmrot...
SIGGRAPH
2000
ACM
15 years 8 months ago
Style machines
We approach the problem of stylistic motion synthesis by learning motion patterns from a highly varied set of motion capture sequences. Each sequence may have a distinct choreogra...
Matthew Brand, Aaron Hertzmann
144
Voted
SP
1998
IEEE
173views Security Privacy» more  SP 1998»
15 years 8 months ago
An Automated Approach for Identifying Potential Vulnerabilities in Software
This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Anup K. Ghosh, Tom O'Connor, Gary McGraw
CSREASAM
2006
15 years 5 months ago
Reinforcing Access Control Using Fuzzy Relation Equations
Current computer security systems are based on the premise that once a user presents valid credentials to the authentication system (e.g. valid ID and password), they are granted ...
Ali Berrached, André de Korvin