Sciweavers

427 search results - page 32 / 86
» Policies: Giving Users Control over Calls
Sort
View
PVLDB
2008
77views more  PVLDB 2008»
13 years 9 months ago
Towards a streaming SQL standard
This paper describes a unification of two different SQL extensions for streams and its associated semantics. We use the data models from Oracle and StreamBase as our examples. Ora...
Namit Jain, Shailendra Mishra, Anand Srinivasan, J...
SACMAT
2003
ACM
14 years 3 months ago
PBDM: a flexible delegation model in RBAC
Role-based access control (RBAC) is recognized as an efficient access control model for large organizations. Most organizations have some business rules related to access control...
Xinwen Zhang, Sejong Oh, Ravi S. Sandhu
ACMACE
2007
ACM
14 years 1 months ago
Remote augmented reality for multiple players over network
Augmented Reality (AR) in multimedia gaming is a dynamic and exciting field of research. One of the challenges is to have multiple users interacting in the networked augmented rea...
Daniel Chun-Ming Leung, Pak-Shing Au, Irwin King, ...
SIGMOD
1998
ACM
166views Database» more  SIGMOD 1998»
14 years 2 months ago
CONTROL: Continuous Output and Navigation Technology with Refinement On-Line
The CONTROL project at U.C. Berkeley has developed technologies to provide online behavior for data-intensive applications. Using new query processing algorithms, these technologi...
Ron Avnur, Joseph M. Hellerstein, Bruce Lo, Chris ...
CHI
2006
ACM
14 years 10 months ago
Active CyberCode: a directly controllable 2D code
Many augmented reality (AR) applications which overlay computer graphics on a real image have been developed. One of the limitations of such applications is that a user has to con...
Yuji Ayatsuka, Jun Rekimoto