Sciweavers

2354 search results - page 195 / 471
» DRM as a layered system
Sort
View
DBSEC
2001
129views Database» more  DBSEC 2001»
13 years 9 months ago
Secure Role-Based Workflow Models
: In this paper we introduce a series of reference models for Secure Role-Based Workflow systems. We build our models over the well-known RBAC96 framework. 96 model supports the no...
Savith Kandala, Ravi S. Sandhu
FUIN
2008
147views more  FUIN 2008»
13 years 8 months ago
A Basic Logic for Reasoning about Connector Reconfiguration
Abstract. Software systems evolve over time. From a component-based software engineering perspective, this means that either the components of the system need to change, or, if com...
Dave Clarke
SKG
2006
IEEE
14 years 2 months ago
A Data Mining Approach Based on Grey Prediction Model in Web Environment
This paper proposes a prediction approach that combines grey prediction model with three-layer computing architecture in Web environment. It presents a refined prediction formula ...
Hui Peng
ECRTS
2005
IEEE
14 years 1 months ago
A Robust Implicit Access Protocol for Real-Time Wireless Collaboration
Advances in wireless technology have brought us closer to extensive deployment of distributed real-time embedded systems connected through a wireless channel. The medium access co...
Tanya L. Crenshaw, Ajay Tirumala, Spencer Hoke, Ma...
GREC
2007
Springer
13 years 12 months ago
Building Synthetic Graphical Documents for Performance Evaluation
In this paper we present a system that allows its use to build synthetic graphical documents for the performance evaluation of symbol recognition systems. The key contribution of ...
Mathieu Delalandre, Tony P. Pridmore, Ernest Valve...