Sciweavers

739 search results - page 137 / 148
» Information Flow in Credential Systems
Sort
View
SACMAT
2009
ACM
14 years 2 months ago
Trojan horse resistant discretionary access control
Modern operating systems primarily use Discretionary Access Control (DAC) to protect files and other operating system resources. DAC mechanisms are more user-friendly than Mandat...
Ziqing Mao, Ninghui Li, Hong Chen, Xuxian Jiang
BIRTHDAY
2010
Springer
14 years 12 days ago
The Arrow of Time through the Lens of Computing
Egon Börger Ambient Abstract State Machines with Applications 11:00 AM Manfred Broy Realizability of System Interface Specifications 11:30 AM Ofer Strichman Proving Equivalence be...
Krishna V. Palem
TREC
2008
13 years 9 months ago
UTDallas at TREC 2008 Blog Track
This paper describes our participation in the 2008 TREC Blog track. Our system consists of 3 components: data preprocessing, topic retrieval, and opinion finding. In the topic ret...
Bin Li, Feifan Liu, Yang Liu
CDC
2008
IEEE
217views Control Systems» more  CDC 2008»
13 years 7 months ago
An ensemble Kalman filtering approach to highway traffic estimation using GPS enabled mobile devices
Traffic state estimation is a challenging problem for the transportation community due to the limited deployment of sensing infrastructure. However, recent trends in the mobile pho...
Daniel B. Work, Olli-Pekka Tossavainen, Sebastien ...
GIL
2004
13 years 9 months ago
Web-basiertes GIS als Informationssystem interdisziplinerer Forschungsprojekte
Abstract: Interdisciplinary research projects with environmental focus need an information technology which is capable of describing the flow of minerals and other substances with ...
Claus Mückschel, Gabriel A. Schachtel, Jens N...