Sciweavers

579 search results - page 100 / 116
» Security Enforcement Model for Distributed Usage Control
Sort
View
ACSW
2006
13 years 9 months ago
A method for access authorisation through delegation networks
Owners of systems and resources usually want to control who can access them. This must be based on having a process for authorising certain parties, combined with mechanisms for e...
Audun Jøsang, Dieter Gollmann, Richard Au
IBPRIA
2007
Springer
14 years 1 months ago
Bayesian Oil Spill Segmentation of SAR Images Via Graph Cuts
Abstract. This paper extends and generalizes the Bayesian semisupervised segmentation algorithm [1] for oil spill detection using SAR images. In the base algorithm on which we buil...
Sónia Pelizzari, José M. Bioucas-Dia...
WECWIS
2005
IEEE
79views ECommerce» more  WECWIS 2005»
14 years 1 months ago
Enabling DRM-Preserving Digital Content Redistribution
Traditionally, the process of online digital content distribution has involved a limited number of centralised distributors selling protected contents and licenses authorising the...
Srijith Krishnan Nair, Bogdan C. Popescu, Chandana...
LCR
1998
Springer
119views System Software» more  LCR 1998»
13 years 12 months ago
QoS Aspect Languages and Their Runtime Integration
Abstract. Distributedobject middleware, suchas CORBA, hides systemand network-speci c characteristics of objects behind functional interface speci cations. This simpli es developme...
Joseph P. Loyall, David E. Bakken, Richard E. Scha...
MSWIM
2005
ACM
14 years 1 months ago
An analytical model of the virtual collision handler of 802.11e
A number of analytical models have been proposed to describe the priority schemes of the Enhanced Distributed Channel Access (EDCA) mechanism of the IEEE 802.11e standard. EDCA pr...
Paal E. Engelstad, Olav N. Østerbø