Sciweavers

954 search results - page 104 / 191
» On Controlled Flexibility
Sort
View
105
Voted
ACSAC
2009
IEEE
15 years 10 months ago
How to Securely Break into RBAC: The BTG-RBAC Model
—Access control models describe frameworks that dictate how subjects (e.g. users) access resources. In the Role-Based Access Control (RBAC) model access to resources is based on ...
Ana Ferreira, David W. Chadwick, Pedro Farinha, Ri...
125
Voted
SOFTVIS
2006
ACM
15 years 9 months ago
Time travelling animated program executions
Visualizations of program executions are often generated on the fly. This has many advantages relative to off-line generation of animated video files. Video files, however, trivia...
Ken Kahn
101
Voted
IHM
2004
ACM
15 years 9 months ago
Couplage de ressources d'interaction
Although coupling interaction resources is key to ubiquitous computing, this notion has been overlooked in previous studies. In this paper, we address this notion in a more system...
Nicolas Barralon, Christophe Lachenal, Joëlle...
122
Voted
DAGSTUHL
2007
15 years 4 months ago
Policy-based Home Care Systems
Abstract. Technology to support care at home is a promising alternative to traditional approaches. However, home care systems present significant technical challenges. For example,...
Feng Wang
187
Voted
CLOUDCOM
2010
Springer
15 years 1 months ago
Attaching Cloud Storage to a Campus Grid Using Parrot, Chirp, and Hadoop
The Hadoop filesystem is a large scale distributed filesystem used to manage and quickly process extremely large data sets. We want to utilize Hadoop to assist with dataintensive ...
Patrick Donnelly, Peter Bui, Douglas Thain