Sciweavers

856 search results - page 89 / 172
» Design Guidance through the Controlled Application of Constr...
Sort
View
SACMAT
2003
ACM
14 years 2 months ago
The role control center: features and case studies
Role-based Access Control (RBAC) models have been implemented not only in self-contained resource management products such as DBMSs and Operating Systems but also in a class of pr...
David F. Ferraiolo, Ramaswamy Chandramouli, Gail-J...
TASE
2011
IEEE
13 years 3 months ago
WireWarping++: Robust and Flexible Surface Flattening With Length Control
— Surface flattening has numerous applications in sheet manufacturing industries, such as garment industry, shoe industry, toy industry, furniture industry and ship industry. Mo...
Yunbo Zhang, Charlie C. L. Wang
DATE
2005
IEEE
118views Hardware» more  DATE 2005»
14 years 2 months ago
Energy- and Performance-Driven NoC Communication Architecture Synthesis Using a Decomposition Approach
In this paper, we present a methodology for customized communication architecture synthesis that matches the communication requirements of the target application. This is an impor...
Ümit Y. Ogras, Radu Marculescu
MM
2010
ACM
185views Multimedia» more  MM 2010»
13 years 9 months ago
The virtual chocolate factory: mixed reality industrial collaboration and control
We show several aspects of a complex mixed reality system that we have built and deployed in a real-world factory setting. In our system, virtual worlds, augmented realities, and ...
Maribeth Back, Don Kimber, Eleanor G. Rieffel, Ant...
CASES
2010
ACM
13 years 7 months ago
Low cost multicast authentication via validity voting in time-triggered embedded control networks
Wired embedded networks must include multicast authentication to prevent masquerade attacks within the network. However, unique constraints for these networks make most existing m...
Christopher Szilagyi, Philip Koopman