Sciweavers

739 search results - page 66 / 148
» Information Flow in Credential Systems
Sort
View
HICSS
2000
IEEE
115views Biometrics» more  HICSS 2000»
13 years 11 months ago
Utility Information Integration - Vision, Benefits, Strategies, and Status
: Successfully incorporating utility engineering functions into business decisions requires integrating the numeric-intensive world of the engineer with business systems that are d...
S. F. Mauser, J. Gillerman, D. Nordell
DEXA
2001
Springer
112views Database» more  DEXA 2001»
14 years 7 days ago
An Information-Driven Framework for Image Mining
Image mining systems that can automatically extract semantically meaningful information (knowledge) from image data are increasingly in demand. The fundamental challenge in image m...
Ji Zhang, Wynne Hsu, Mong-Li Lee
CDC
2008
IEEE
166views Control Systems» more  CDC 2008»
13 years 9 months ago
Distributed coverage verification in sensor networks without location information
In this paper, we present a series of distributed algorithms for coverage verification in sensor networks with no location information. We demonstrate how, in the absence of locali...
Alireza Tahbaz-Salehi, Ali Jadbabaie
CCS
2006
ACM
13 years 11 months ago
Application security support in the operating system kernel
Application security is typically coded in the application. In kernelSec, we are investigating mechanisms to implement application security in an operating system kernel. The mech...
Manigandan Radhakrishnan, Jon A. Solworth
BIRD
2008
Springer
123views Bioinformatics» more  BIRD 2008»
13 years 9 months ago
E-BioFlow: Different Perspectives on Scientific Workflows
We introduce a new type of workflow design system called e-BioFlow and illustrate it by means of a simple sequence alignment workflow. E-BioFlow, intended to model advanced scienti...
Ingo H. C. Wassink, Han Rauwerda, Paul E. van der ...