Sciweavers

232 search results - page 17 / 47
» Credentials-Based Authorization: Evaluation and Implementati...
Sort
View
CHI
2008
ACM
14 years 10 months ago
Improving meeting capture by applying television production principles with audio and motion detection
Video recordings of meetings are often monotonous and tedious to watch. In this paper, we report on the design, implementation and evaluation of an automated meeting capture syste...
Abhishek Ranjan, Jeremy P. Birnholtz, Ravin Balakr...
SIS
2007
13 years 11 months ago
A General Approach to Securely Querying XML
Access control models for XML data can be classified in two major categories: node filtering and query rewriting systems. The first category includes approaches that use access ...
Ernesto Damiani, Majirus Fansi, Alban Gabillon, St...
MIDDLEWARE
2004
Springer
14 years 3 months ago
On the benefits of decomposing policy engines into components
In order for middleware systems to be adaptive, their properties and services need to support a wide variety of application-specific policies. However, application developers and ...
Konstantin Beznosov
EVOW
2010
Springer
14 years 4 months ago
Search-Based Procedural Content Generation
Recently, a small number of papers have appeared in which the authors implement stochastic search algorithms, such as evolutionary computation, to generate game content, such as le...
Julian Togelius, Georgios N. Yannakakis, Kenneth O...
POLICY
2009
Springer
14 years 4 months ago
The Zodiac Policy Subsystem: A Policy-Based Management System for a High-Security MANET
Abstract—Zodiac (Zero Outage Dynamic Intrinsically Assurable Communities) is an implementation of a high-security MANET, resistant to multiple types of attacks, including Byzanti...
Yuu-Heng Cheng, Mariana Raykova, Alexander Poylish...