Sciweavers

998 search results - page 61 / 200
» From Feasible Proofs to Feasible Computations
Sort
View
WETICE
1997
IEEE
14 years 1 months ago
How Role Based Access Control is Implemented in SESAME
In this paper we want to share our experiences with implementing a scheme that enforces role based access control in a distributed, heterogeneous computing environment. This work ...
Mark Vandenwauver, René Govaerts, Joos Vand...
DBSEC
2008
152views Database» more  DBSEC 2008»
13 years 10 months ago
An Attack Graph-Based Probabilistic Security Metric
To protect critical resources in today’s networked environments, it is desirable to quantify the likelihood of potential multi-step attacks that combine multiple vulnerabilities....
Lingyu Wang, Tania Islam, Tao Long, Anoop Singhal,...
MVA
2007
216views Computer Vision» more  MVA 2007»
13 years 8 months ago
Pose estimation for objects with planar surfaces using eigenimage and range data analysis
In this paper we present a novel method for estimating the object pose for 3D objects with welldefined planar surfaces. Specifically, we investigate the feasibility of estimating...
Ovidiu Ghita, Paul F. Whelan, David Vernon, John M...
ICCV
2009
IEEE
13 years 6 months ago
Structure and kinematics triangulation with a rolling shutter stereo rig
We describe a spatio-temporal triangulation method to be used with rolling shutter cameras. We show how a single pair of rolling shutter images enables the computation of both str...
Omar Ait-Aider, François Berry
ICC
2007
IEEE
127views Communications» more  ICC 2007»
14 years 3 months ago
Inter-Domain Path Computation using Improved Crankback Signaling in Label Switched Networks
—For label switched networks, such as MPLS and GMPLS, most existing traffic engineering (TE) solutions work in a single routing domain. These solutions do not work when a route ...
Faisal Aslam, Zartash Afzal Uzmi, Adrian Farrel, M...