Sciweavers

1965 search results - page 9 / 393
» Information shared by many objects
Sort
View
OOPSLA
2000
Springer
13 years 11 months ago
An approach to safe object sharing
It is essential for security to be able to isolate mistrusting programs from one another, and to protect the host platform from programs. Isolation is difficult in object-oriented...
Ciarán Bryce, Chrislain Razafimahefa
AR
2005
73views more  AR 2005»
13 years 7 months ago
Cooperative behavior based on a subjective map with shared information in a dynamic environment
This paper proposes a subjective map representation that enables a robot in a multiagent system to make decisions in a dynamic, hostile environment. A typical situation can be fou...
Noriaki Mitsunaga, Taku Izumi, Minoru Asada
SACMAT
2009
ACM
14 years 1 months ago
Foundations for group-centric secure information sharing models
We develop the foundations for a theory of Group-Centric Secure Information Sharing (g-SIS), characterize a specific family of models in this arena and identify several direction...
Ram Krishnan, Ravi S. Sandhu, Jianwei Niu, William...
JAMIA
2011
140views more  JAMIA 2011»
12 years 10 months ago
Never too old for anonymity: a statistical standard for demographic data sharing via the HIPAA Privacy Rule
Objective Healthcare organizations must de-identify patient records before sharing data. Many organizations rely on the Safe Harbor Standard of the HIPAAPrivacy Rule, which enumer...
Bradley Malin, Kathleen Benitez, Daniel R. Masys
DSRT
2004
IEEE
13 years 11 months ago
Shared Object Manipulation with Decorators in Virtual Environments
One of the known problems with shared object manipulation in virtual environments is the disruptive effect of network lag in collaboration sessions. Most solutions to this problem...
Shervin Shirmohammadi, Nancy Ho Woo