Sciweavers

2614 search results - page 185 / 523
» Information System Architectures: From Art to Science
Sort
View
WPES
2005
ACM
14 years 1 months ago
Anonymous yet accountable access control
This paper introduces a novel approach for augmenting attributebased access control systems in a way that allows them to offer fully anonymous access to resources while at the sam...
Michael Backes, Jan Camenisch, Dieter Sommer
APCCM
2004
13 years 9 months ago
Enterprise Architecture Modelling using Elastic Metaphors
Despite the hype surrounding enterprise architectures, they have delivered little on their promise. In this paper, we argue that enterprise architectures built using component-bas...
Gerald R. Khoury, Simeon J. Simoff
INFSOF
2000
82views more  INFSOF 2000»
13 years 8 months ago
Connecting architecture reconstruction frameworks
A number of standalone tools are designed to help developers understand software systems. These tools operate at different levels of abstraction, from low level source code to sof...
Ivan T. Bowman, Michael W. Godfrey, Richard C. Hol...
IISWC
2006
IEEE
14 years 2 months ago
Modeling Cache Sharing on Chip Multiprocessor Architectures
— As CMPs are emerging as the dominant architecture for a wide range of platforms (from embedded systems and game consoles, to PCs, and to servers) the need to manage on-chip res...
Pavlos Petoumenos, Georgios Keramidas, Håkan...
IH
2009
Springer
14 years 2 months ago
Detect Digital Image Splicing with Visual Cues
Image splicing detection has been considered as one of the most challenging problems in passive image authentication. In this paper, we propose an automatic detection framework to ...
Zhenhua Qu, Guoping Qiu, Jiwu Huang