Sciweavers

739 search results - page 127 / 148
» Information Flow in Credential Systems
Sort
View
CVPR
2010
IEEE
14 years 4 months ago
High-Resolution Modeling of Moving and Deforming Objects Using Sparse Geometric and Dense Photometric Measurements
Modeling moving and deforming objects requires capturing as much information as possible during a very short time. When using off-the-shelf hardware, this often hinders the resolu...
Yi Xu, Daniel Aliaga
ICON
2007
IEEE
14 years 1 months ago
Lightweight Detection of DoS Attacks
Denial of Service (DoS) attacks have continued to evolve and they impact the availability of Internet infrastructure. Many researchers in the field of network security and system ...
Sirikarn Pukkawanna, Vasaka Visoottiviseth, Panita...
GROUP
1999
ACM
13 years 12 months ago
Getting some perspective: using process descriptions to index document history
Process descriptions are used in workflow and related systems to describe the flow of work and organisational responsibility in business processes, and to aid in coordination. How...
Paul Dourish, Richard Bentley, Rachel Jones, Allan...
RIDE
1999
IEEE
13 years 12 months ago
Specification of Cooperative Constraints in Virtual Enterprise Workflow
Workflow systems are an emerging technology which have become increasingly important in the drive for business to provide better services and increase productivity. Intuitively, w...
Anne H. H. Ngu
USENIX
2007
13 years 10 months ago
Using Provenance to Aid in Personal File Search
As the scope of personal data grows, it becomes increasingly difficult to find what we need when we need it. Desktop search tools provide a potential answer, but most existing too...
Sam Shah, Craig A. N. Soules, Gregory R. Ganger, B...