Sciweavers

396 search results - page 32 / 80
» Generalizing Parametricity Using Information-flow
Sort
View
IPAW
2010
13 years 7 months ago
Securing Provenance-Based Audits
Given the significant increase of on-line services that require personal information from users, the risk that such information is misused has become an important concern. In such ...
Rocío Aldeco-Pérez, Luc Moreau
GIS
2008
ACM
14 years 10 months ago
Integrating gazetteers and remote sensed imagery
This work explores the potential for increased synergy between gazetteers and high-resolution remote sensed imagery. These two data sources are complementary. Gazetteers provide h...
Shawn Newsam, Yi Yang
UIST
2006
ACM
14 years 3 months ago
RecipeSheet: creating, combining and controlling information processors
Many tasks require users to extract information from diverse sources, to edit or process this information locally, and to explore how the end results are affected by changes in th...
Aran Lunzer, Kasper Hornbæk
ICCS
2001
Springer
14 years 1 months ago
The Policy Machine for Security Policy Management
Abstract. Many different access control policies and models have been developed to suit a variety of goals; these include Role-Based Access Control, One-directional Information Flo...
Vincent C. Hu, Deborah A. Frincke, David F. Ferrai...
CIKM
2008
Springer
13 years 11 months ago
An extended cooperative transaction model for xml
In many application areas, for example in design or media production processes, several authors have to work cooperatively on the same project. Thereby, a frequently used data for...
Francis Gropengießer, Kai-Uwe Sattler