Sciweavers

1795 search results - page 282 / 359
» Security Models and Information Flow
Sort
View
IEEEARES
2007
IEEE
14 years 3 months ago
Formalising Dynamic Trust Negotiations in Decentralised Collaborative e-Health Systems
Access control in decentralised collaborative systems present huge challenges especially where many autonomous entities including organisations, humans, software agents from diff...
Oluwafemi Ajayi, Richard O. Sinnott, Anthony Stell
DRM
2003
Springer
14 years 2 months ago
Breaking and repairing optimistic fair exchange from PODC 2003
In PODC 2003, Park, Chong, Siegel and Ray [22] proposed an optimistic protocol for fair exchange, based on RSA signatures. We show that their protocol is totally breakable already...
Yevgeniy Dodis, Leonid Reyzin
DAC
2007
ACM
14 years 10 months ago
A System For Coarse Grained Memory Protection In Tiny Embedded Processors
Many embedded systems contain resource constrained microcontrollers where applications, operating system components and device drivers reside within a single address space with no...
Ram Kumar, Akhilesh Singhania, Andrew Castner, Edd...
ISBI
2006
IEEE
14 years 9 months ago
A diffusion tensor imaging tractography algorithm based on Navier-Stokes fluid mechanics
We introduce a method for estimating regional connectivity in diffusion tensor magnetic resonance imaging (DT-MRI) based on a fluid mechanics model. We customize the Navier-Stokes...
Nathan S. Hageman, David W. Shattuck, Katherine Na...
MIR
2010
ACM
191views Multimedia» more  MIR 2010»
14 years 29 days ago
Video retargeting with multi-scale trajectory optimization
Mobile devices are increasingly powerful in media storage and rendering. The prevalent request of decent video browsing on mobile devices is demanding. However, one limitation com...
Yuanning Li, YongHong Tian, Jingjing Yang, Ling-Yu...