Sciweavers

3031 search results - page 122 / 607
» Reuse in the application layer
Sort
View
SACMAT
2010
ACM
13 years 8 months ago
An architecture for enforcing end-to-end access control over web applications
The web is now being used as a general platform for hosting distributed applications like wikis, bulletin board messaging systems and collaborative editing environments. Data from...
Boniface Hicks, Sandra Rueda, Dave King 0002, Thom...
TASLP
2008
124views more  TASLP 2008»
13 years 10 months ago
Sparse Linear Regression With Structured Priors and Application to Denoising of Musical Audio
Abstract--We describe in this paper an audio denoising technique based on sparse linear regression with structured priors. The noisy signal is decomposed as a linear combination of...
Cédric Févotte, Bruno Torrésa...
INFORMATICALT
2002
72views more  INFORMATICALT 2002»
13 years 10 months ago
One Application of the Parallelization Tool of Master-Slave Algorithms
The paper analyzes the performance of parallel global optimization algorithm, which is used to optimize grillage-type foundations. The parallel algorithm is obtained by using the a...
Milda Baravykaite, Rimantas Belevicius, Raimondas ...
CSMR
1998
IEEE
14 years 2 months ago
Protection Reconfiguration for Reusable Software
Secure distributed applications often include code to authenticate users, verify access rights, and establish secure communication channels between software components (e.g., clie...
Christian Damsgaard Jensen, Daniel Hagimont
ETFA
2006
IEEE
14 years 4 months ago
Integrating Inaccessibility Control and Timer Management in CANELy
The CAN Enhanced Layer (CANELy) is a CAN-based infrastructure capable of extremely reliable communication. This paper describes the mechanisms and the techniques used in CANELy to...
José Rufino, Paulo Veríssimo, Carlos...