Sciweavers

2061 search results - page 209 / 413
» Authorization for Metacomputing Applications
Sort
View
EUROSYS
2008
ACM
16 years 1 months ago
Samurai: protecting critical data in unsafe languages
Programs written in type-unsafe languages such as C and C++ incur costly memory errors that result in corrupted data structures, program crashes, and incorrect results. We present...
Karthik Pattabiraman, Vinod Grover, Benjamin G. Zo...
ACSAC
2009
IEEE
15 years 11 months ago
How to Securely Break into RBAC: The BTG-RBAC Model
—Access control models describe frameworks that dictate how subjects (e.g. users) access resources. In the Role-Based Access Control (RBAC) model access to resources is based on ...
Ana Ferreira, David W. Chadwick, Pedro Farinha, Ri...
ICB
2009
Springer
144views Biometrics» more  ICB 2009»
15 years 11 months ago
Parts-Based Face Verification Using Local Frequency Bands
ic Presentations - Abstracts list Monday, August 31st Session 1 – Chairman: Jean-Marc Odobez Title Quality Measures and Stacking Classifiers in Multimodal Biometric Recognition S...
Chris McCool, Sébastien Marcel
ICIDS
2009
Springer
15 years 11 months ago
Say Anything: A Demonstration of Open Domain Interactive Digital Storytelling
Say Anything is a text-based interactive digital storytelling application that differs from other systems in its emphasis on the ability of users to create a narrative in any domai...
Reid Swanson, Andrew S. Gordon
SIGMETRICS
2009
ACM
157views Hardware» more  SIGMETRICS 2009»
15 years 11 months ago
Delay tolerant bulk data transfers on the internet
Many emerging scientific and industrial applications require transferring multiple Tbytes of data on a daily basis. Examples include pushing scientific data from particle accele...
Nikolaos Laoutaris, Georgios Smaragdakis, Pablo Ro...