Sciweavers

2494 search results - page 313 / 499
» Dependable Distributed Computing Using Free Databases
Sort
View
CCS
2007
ACM
14 years 2 months ago
Managing RBAC states with transitive relations
In this paper, we study the maintenance of role-based access control (RBAC) models in database environments using transitive closure relations. In particular, the algorithms that ...
Chaoyi Pang, David P. Hansen, Anthony J. Maeder
SIBGRAPI
2005
IEEE
14 years 1 months ago
Linear Complexity Stereo Matching Based on Region Indexing
This paper presents a linear complexity method for real-time stereo matching, in which the processing time is only dependent on the image resolution. Regions along each epipolar l...
Marco Antonio Floriano de Oliveira, Raul Sidnei Wa...
TCC
2005
Springer
118views Cryptology» more  TCC 2005»
14 years 1 months ago
On the Relationships Between Notions of Simulation-Based Security
Several compositional forms of simulation-based security have been proposed in the literature, including universal composability, black-box simulatability, and variants thereof. Th...
Anupam Datta, Ralf Küsters, John C. Mitchell,...
COLING
2010
13 years 3 months ago
Word Space Modeling for Measuring Semantic Specificity in Chinese
The aim of this study is to use the word-space model to measure the semantic loads of single verbs, profile verbal lexicon acquisition, and explore the semantic information on Chi...
Ching-Fen Pan, Shu-Kai Hsieh
DSD
2006
IEEE
114views Hardware» more  DSD 2006»
14 years 2 months ago
Improved Precision of Coarse Grained Localization in Wireless Sensor Networks
In wireless sensor networks, the coarse grained localization is a method to compute the position of randomly distributed sensor nodes. Without optimizations, it provides low preci...
Frank Reichenbach, Jan Blumenthal, Dirk Timmermann