Sciweavers

240 search results - page 20 / 48
» Incorporating Tables into Proofs
Sort
View
DIM
2005
ACM
13 years 9 months ago
Establishing and protecting digital identity in federation systems
We develop solutions for the security and privacy of user identity information in a federation. By federation we mean a group of organizations or service providers which have buil...
Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciari...
ICIP
2001
IEEE
14 years 9 months ago
Bayesian high-resolution reconstruction of low-resolution compressed video
A method for simultaneously estimating the high-resolution frames and the corresponding motion field from a compressed low-resolution video sequence is presented. The algorithm in...
Rafael Molina, Aggelos K. Katsaggelos, Javier Mate...
ICDE
2007
IEEE
118views Database» more  ICDE 2007»
14 years 9 months ago
Fine Grained Authorization Through Predicated Grants
Authorization in SQL is currently at the level of tables or columns. Many applications need a finer level of control. We propose a model for fine-grained authorization based on ad...
Surajit Chaudhuri, Tanmoy Dutta, S. Sudarshan
CHI
2003
ACM
14 years 8 months ago
Containers: a new hierarchical model for browser interfaces
The development of a low bandwidth, high error tolerant neural browser, called the BrainBrowser, has raised new navigational issues. With this paradigm shift of twodimensional spa...
Chad Owens
SCAM
2007
IEEE
14 years 2 months ago
SQuAVisiT: A Software Quality Assessment and Visualisation Toolset
Software quality assessment of large COBOL industrial legacy systems, both for maintenance or migration purposes, mounts a serious challenge. We present the Software Quality Asses...
Serguei A. Roubtsov, Alexandru Telea, Danny Holten