Sciweavers

798 search results - page 45 / 160
» Comparing the expressive power of access control models
Sort
View
ACSAC
2002
IEEE
14 years 1 months ago
A Model for Attribute-Based User-Role Assignment
The Role-Based Access Control (RBAC) model is traditionally used to manually assign users to appropriate roles, based on a specific enterprise policy, thereby authorizing them to ...
Mohammad A. Al-Kahtani, Ravi S. Sandhu
ICC
2007
IEEE
125views Communications» more  ICC 2007»
14 years 24 days ago
Increasing Power Efficiency in Transmitter Diversity Systems under Error Performance Constraints
Motivated by combinatorial optimization theory, we propose an algorithmic power allocation method that minimizes the total transmitting power in transmitter diversity systems, prov...
Diomidis S. Michalopoulos, Athanasios S. Lioumpas,...
EUROSYS
2007
ACM
14 years 6 months ago
Comparing the performance of web server architectures
In this paper, we extensively tune and then compare the performance of web servers based on three different server architectures. The µserver utilizes an event-driven architectur...
David Pariag, Tim Brecht, Ashif S. Harji, Peter A....
BMCBI
2006
97views more  BMCBI 2006»
13 years 9 months ago
Goulphar: rapid access and expertise for standard two-color microarray normalization methods
Background: Raw data normalization is a critical step in microarray data analysis because it directly affects data interpretation. Most of the normalization methods currently used...
Sophie Lemoine, Florence Combes, Nicolas Servant, ...
GRAPHICSINTERFACE
2008
13 years 10 months ago
Interactive 3D facial expression posing through 2D portrait manipulation
Sculpting various 3D facial expressions from a static 3D face model is a process with intensive manual tuning efforts. In this paper, we present an interactive 3D facial expressio...
Tanasai Sucontphunt, Zhenyao Mo, Ulrich Neumann, Z...