Sciweavers

202 search results - page 9 / 41
» Managing Controlled Violation of Temporal Process Constraint...
Sort
View
HICSS
2009
IEEE
97views Biometrics» more  HICSS 2009»
14 years 2 months ago
Selecting Web Services and Participants for Enforcing Workflow Access Control
Web services have emerged as a de facto standard for encapsulating services within or across organization boundaries. Various proposals have been made to compose Web services into...
San-Yih Hwang, Chuan Yin, Chien-Hsiang Lee
TIP
2008
109views more  TIP 2008»
13 years 7 months ago
Iterative Rate-Distortion Optimization of H.264 With Constant Bit Rate Constraint
In this paper, we apply the primal-dual decomposition and subgradient projection methods to solve the rate-distortion optimization problem with the constant bit rate constraint. Th...
Cheolhong An, Truong Q. Nguyen
SAC
2004
ACM
14 years 27 days ago
A mobile agent approach for global database constraint checking
Integrity constraints are valuable tools for enforcing consistency of data in a database. Global integrity constraints ensure integrity and consistency of data spanning multiple d...
Praveen Madiraju, Rajshekhar Sunderraman
CCS
2008
ACM
13 years 9 months ago
On spatio-temporal constraints and inheritance in role-based access control
Pervasive computing environments have created a requirement for spatial- and temporal-aware access control systems. Although temporal, spatial and spatio-temporal role-based acces...
Liang Chen, Jason Crampton
WISE
2000
Springer
13 years 12 months ago
VideoMAP*: A Web-based Architecture for a Spatio-Temporal Video Database Management System
In this paper, we present a web-based architecture of a spatiotemporal video data management system, which can accommodate a wide range of activities by various types of users. Be...
Shermann S.-M. Chan, Qing Li