Sciweavers

1795 search results - page 248 / 359
» Security Models and Information Flow
Sort
View
MOBISYS
2008
ACM
14 years 9 months ago
Anonysense: privacy-aware people-centric sensing
Personal mobile devices are increasingly equipped with the capability to sense the physical world (through cameras, microphones, and accelerometers, for example) and the network w...
Cory Cornelius, Apu Kapadia, David Kotz, Daniel Pe...
BMCBI
2007
160views more  BMCBI 2007»
13 years 10 months ago
Optimization based automated curation of metabolic reconstructions
Background: Currently, there exists tens of different microbial and eukaryotic metabolic reconstructions (e.g., Escherichia coli, Saccharomyces cerevisiae, Bacillus subtilis) with...
Vinay Satish Kumar, Madhukar S. Dasika, Costas D. ...
EMNLP
2010
13 years 8 months ago
What a Parser Can Learn from a Semantic Role Labeler and Vice Versa
In many NLP systems, there is a unidirectional flow of information in which a parser supplies input to a semantic role labeler. In this paper, we build a system that allows inform...
Stephen A. Boxwell, Dennis Mehay, Chris Brew
CCS
2009
ACM
14 years 10 months ago
Expressive policy analysis with enhanced system dynamicity
Despite several research studies, the effective analysis of policy based systems remains a significant challenge. Policy analysis should at least (i) be expressive (ii) take accou...
Robert Craven, Jorge Lobo, Jiefei Ma, Alessandra R...
MOBILITY
2009
ACM
14 years 2 months ago
Context-sensitive authorization in interaction patterns
Main requirement of recent computing environments, like mobile and then ubiquitous computing, is to adapt applications to context. On the other hand, access control generally trus...
Vincent Hourdin, Jean-Yves Tigli, Stephane Lavirot...