Sciweavers

16843 search results - page 3349 / 3369
» On Generalized Authorization Problems
Sort
View
TISSEC
2010
142views more  TISSEC 2010»
13 years 2 months ago
A logical specification and analysis for SELinux MLS policy
The SELinux mandatory access control (MAC) policy has recently added a multi-level security (MLS) model which is able to express a fine granularity of control over a subject'...
Boniface Hicks, Sandra Rueda, Luke St. Clair, Tren...
TIT
2010
111views Education» more  TIT 2010»
13 years 2 months ago
Designing floating codes for expected performance
Floating codes are codes designed to store multiple values in a Write Asymmetric Memory, with applications to flash memory. In this model, a memory consists of a block of n cells, ...
Flavio Chierichetti, Hilary Finucane, Zhenming Liu...
TOG
2010
89views more  TOG 2010»
13 years 2 months ago
Volumetric modeling with diffusion surfaces
The modeling of volumetric objects is still a difficult problem. Solid texture synthesis methods enable the design of volumes with homogeneous textures, but global features such a...
Kenshi Takayama, Olga Sorkine, Andrew Nealen, Take...
TSP
2010
13 years 2 months ago
Communications-inspired sensing: a case study on waveform design
Information theory, and particularly the mutual information (MI), has provided fundamental guidance for communications research. In Bell's 1993 paper, the MI was first applied...
Wenshu Zhang, Liuqing Yang
TSP
2010
13 years 2 months ago
Variance-component based sparse signal reconstruction and model selection
We propose a variance-component probabilistic model for sparse signal reconstruction and model selection. The measurements follow an underdetermined linear model, where the unknown...
Kun Qiu, Aleksandar Dogandzic
« Prev « First page 3349 / 3369 Last » Next »