Sciweavers

1818 search results - page 156 / 364
» How users use access control
Sort
View
IFIP
2000
Springer
14 years 1 months ago
Test Case Design for the Validation of Component-Based Embedded Systems
The validation of functional and real-time requirements of control software for embedded systems is a difficult task. It usually needs the electronic control unit (ECU) and the co...
W. Fleisch
CORR
2010
Springer
167views Education» more  CORR 2010»
13 years 8 months ago
Collaborative Astronomical Image Mosaics
This chapter describes how astronomical imaging survey data have become a vital part of modern astronomy, how these data are archived and then served to the astronomical community...
Daniel S. Katz, G. Bruce Berriman, Robert G. Mann
GLOBECOM
2010
IEEE
13 years 7 months ago
Constructing Secure Localization Systems with Adjustable Granularity Using Commodity Hardware
Proof of a user's identity is not always a sufficient means for making an authorization decision. In an increasing set of circumstances, knowledge of physical location provide...
Patrick Traynor, Joshua Schiffman, Thomas F. La Po...
P2P
2010
IEEE
150views Communications» more  P2P 2010»
13 years 8 months ago
Spotify -- Large Scale, Low Latency, P2P Music-on-Demand Streaming
Abstract—Spotify is a music streaming service offering lowlatency access to a library of over 8 million music tracks. Streaming is performed by a combination of client-server acc...
Gunnar Kreitz, Fredrik Niemelä
CVPR
2004
IEEE
14 years 11 months ago
Programmable Imaging Using a Digital Micromirror Array
In this paper, we introduce the notion of a programmable imaging system. Such an imaging system provides a human user or a vision system significant control over the radiometric a...
Shree K. Nayar, Vlad Branzoi, Terrance E. Boult