Sciweavers

202 search results - page 9 / 41
» Managing Controlled Violation of Temporal Process Constraint...
Sort
View
113
Voted
HICSS
2009
IEEE
97views Biometrics» more  HICSS 2009»
15 years 10 months ago
Selecting Web Services and Participants for Enforcing Workflow Access Control
Web services have emerged as a de facto standard for encapsulating services within or across organization boundaries. Various proposals have been made to compose Web services into...
San-Yih Hwang, Chuan Yin, Chien-Hsiang Lee
130
Voted
TIP
2008
109views more  TIP 2008»
15 years 3 months ago
Iterative Rate-Distortion Optimization of H.264 With Constant Bit Rate Constraint
In this paper, we apply the primal-dual decomposition and subgradient projection methods to solve the rate-distortion optimization problem with the constant bit rate constraint. Th...
Cheolhong An, Truong Q. Nguyen
121
Voted
SAC
2004
ACM
15 years 9 months ago
A mobile agent approach for global database constraint checking
Integrity constraints are valuable tools for enforcing consistency of data in a database. Global integrity constraints ensure integrity and consistency of data spanning multiple d...
Praveen Madiraju, Rajshekhar Sunderraman
127
Voted
CCS
2008
ACM
15 years 5 months ago
On spatio-temporal constraints and inheritance in role-based access control
Pervasive computing environments have created a requirement for spatial- and temporal-aware access control systems. Although temporal, spatial and spatio-temporal role-based acces...
Liang Chen, Jason Crampton
158
Voted
WISE
2000
Springer
15 years 8 months ago
VideoMAP*: A Web-based Architecture for a Spatio-Temporal Video Database Management System
In this paper, we present a web-based architecture of a spatiotemporal video data management system, which can accommodate a wide range of activities by various types of users. Be...
Shermann S.-M. Chan, Qing Li