Sciweavers

241 search results - page 37 / 49
» Implementation of a discretionary access control model for s...
Sort
View
JCP
2008
206views more  JCP 2008»
13 years 8 months ago
SW-R2P: A Trusted Small World Overlay P2P Network with Zero Knowledge Identification
In order to implement both the efficiency and security in the Peer-to-Peer (P2P) network, we design a trusted small world overlay P2P network with the role based and reputation bas...
Yingjie Xia, Guanghua Song, Yao Zheng
RBAC
2000
129views more  RBAC 2000»
13 years 10 months ago
Enabling technologies for role based online decision engines
: Enabling Technologies for Role Based Online Decision Engines Thomas Hildmann, Thomas Gebhardt 22-Feb-2000 The goal of our work at the Technical University of Berlin is to develop...
Thomas Gebhardt, Thomas Hildmann
DAC
2007
ACM
14 years 9 months ago
A System For Coarse Grained Memory Protection In Tiny Embedded Processors
Many embedded systems contain resource constrained microcontrollers where applications, operating system components and device drivers reside within a single address space with no...
Ram Kumar, Akhilesh Singhania, Andrew Castner, Edd...
VL
1992
IEEE
153views Visual Languages» more  VL 1992»
14 years 7 days ago
MAVIS: A Visual Environment for Active Computer Vision
MAVIS is a dataflow visual languagefor computer vision and image processing. It features a high degree of `liveness' and compliance with user directives, providing ajexible e...
Thomas J. Olson, Nicholas G. Klop, Mark R. Hyett, ...
PDPTA
2004
13 years 10 months ago
Service Oriented Web Based Meta Resource Sharing Platform - The CBWeB Portal
Grid computing and cluster computing platforms are becoming the primary development platforms for pervasive computing. The primary problem associated with both computational grids...
Avinash Shankar, Daniel Saffioti, Ian Piper, Ashwi...