Sciweavers

830 search results - page 58 / 166
» Responsiveness without interrupts
Sort
View
SACMAT
2006
ACM
14 years 2 months ago
The secondary and approximate authorization model and its application to Bell-LaPadula policies
We introduce the concept, model, and policy-specific algorithms for inferring new access control decisions from previous ones. Our secondary and approximate authorization model (...
Jason Crampton, Wing Leung, Konstantin Beznosov
ITC
1997
IEEE
73views Hardware» more  ITC 1997»
14 years 8 days ago
A Low-Overhead Design for Testability and Test Generation Technique for Core-Based Systems
In a fundamental paradigm shift in system design, entire systems are being built on a single chip, using multiple embedded cores. Though the newest system design methodology has s...
Indradeep Ghosh, Niraj K. Jha, Sujit Dey
ICIP
2008
IEEE
14 years 9 months ago
Dark line detection with line width extraction
Automated line detection is a classical image processing topic with many applications such as road detection in remote images and vessel detection in medical images. Many traditio...
Qin Li, Lei Zhang, Jane You, David Zhang, Prabir B...
ICIP
2006
IEEE
14 years 9 months ago
Content Adaptive Wyner-ZIV Video Coding Driven by Motion Activity
In distributed video coding (DVC), the video statistics are exploited, partially or totally at the decoder. A particular case of DVC, WynerZiv video coding deals with lossy source...
João Ascenso, Catarina Brites, Fernando Per...
ICDE
2005
IEEE
100views Database» more  ICDE 2005»
14 years 9 months ago
Configurable Security Protocols for Multi-party Data Analysis with Malicious Participants
Standard multi-party computation models assume semi-honest behavior, where the majority of participants implement protocols according to specification, an assumption not always pl...
Bradley Malin, Edoardo Airoldi, Samuel Edoho-Eket,...