Sciweavers

897 search results - page 106 / 180
» Security Requirements for RFID Computing Systems
Sort
View
ICCV
2007
IEEE
14 years 10 months ago
Soylent Grid: it's Made of People
The ground truth labeling of an image dataset is a task that often requires a large amount of human time and labor. We present an infrastructure for distributed human labeling tha...
Stephan Steinbach, Vincent Rabaud, Serge Belongie
SACMAT
2011
ACM
12 years 11 months ago
xDAuth: a scalable and lightweight framework for cross domain access control and delegation
Cross domain resource sharing and collaborations have become pervasive in today’s service oriented organizations. Existing approaches for the realization of cross domain access ...
Masoom Alam, Xinwen Zhang, Kamran Khan, Gohar Ali
MSS
1999
IEEE
112views Hardware» more  MSS 1999»
14 years 13 days ago
HPSS at Los Alamos: Experiences and Analysis
The High Performance Storage System (HPSS) is currently deployed on the open and secure networks at Los Alamos National Laboratory (LANL). Users of the Accelerated Strategic Compu...
Per Lysne, Gary Lee, Lynn Jones, Mark Roschke
NSDI
2008
13 years 10 months ago
Using Salience Differentials to Making Visual Cues Noticeable
There is a large body of research on how to design user interfaces for systems so as to ensure that important messages from the systems are presented to the user to maximize the p...
Andreas P. Heiner, N. Asokan
WISE
2010
Springer
13 years 6 months ago
The Ubiquitous DBMS
Advancement in mobile computing technologies has prompted strong needs for database systems that can be used in small devices such as sensors, cellular phones, PDAs, car navigator...
Kyu-Young Whang