Sciweavers

490 search results - page 51 / 98
» Operations on Records
Sort
View
CSFW
2006
IEEE
14 years 3 months ago
Privacy APIs: Access Control Techniques to Analyze and Verify Legal Privacy Policies
There is a growing interest in establishing rules to regulate the privacy of citizens in the treatment of sensitive personal data such as medical and financial records. Such rule...
Michael J. May, Carl A. Gunter, Insup Lee
ICDE
2006
IEEE
104views Database» more  ICDE 2006»
14 years 3 months ago
Trusted CVS
The CVS (Concurrent Versions System) software is a popular method for recording modifications to data objects, in addition to concurrent access to data in a multi-user environmen...
Muthuramakrishnan Venkitasubramaniam, Ashwin Macha...
ICRA
2006
IEEE
136views Robotics» more  ICRA 2006»
14 years 3 months ago
Predictive Control Algorithms using Biological Signals for Active Relative Motion Canceling in Robotic Assisted Heart Surgery
— Robotics technology promises an enhanced way of performing off-pump coronary artery bypass graft (CABG) surgery. In the robotic-assisted CABG surgery, surgeon performs the oper...
Ozkan Bebek, Murat Cenk Cavusoglu
ISCAS
2005
IEEE
140views Hardware» more  ISCAS 2005»
14 years 2 months ago
Macroblock-based algorithm for dual-bitstream MPEG video streaming with VCR functionalities
— Reverse playback is the most common video cassette recording (VCR) functions in many digital video players. However, the predictive processing techniques employed in MPEG sever...
Tak-Piu Ip, Yui-Lam Chan, Chang-Hong Fu, Wan-Chi S...
SIGOPSE
2004
ACM
14 years 2 months ago
Trust but verify: accountability for network services
This paper promotes accountability as a central design goal for dependable networked systems. We define three properties for accountable systems that extend beyond the basic secu...
Aydan R. Yumerefendi, Jeffrey S. Chase