Sciweavers

1150 search results - page 45 / 230
» Specifying Information-Flow Controls
Sort
View
ICETE
2004
253views Business» more  ICETE 2004»
13 years 10 months ago
BLAZE: A Mobile Agent Paradigm for VoIP Intrusion Detection Systems
ser provides abstraction for supporting flexible security policies that can be developed using the low-level primitives of the browser. We believe our browser architecture will be ...
Kapil Singh, Son T. Vuong
SACMAT
2005
ACM
14 years 2 months ago
Relevancy based access control of versioned XML documents
Integration of version and access control of XML documents has the benefit of regulating access to rapidly growing archives of XML documents. Versioned XML documents provide us w...
Mizuho Iwaihara, Somchai Chatvichienchai, Chutipor...
SIGGRAPH
1990
ACM
14 years 1 months ago
Reusable motion synthesis using state-space controllers
The use of physically-based techniques for computer animation can result in realistic object motion. The price paid for physically-based motion synthesis lies in increased computa...
Michiel van de Panne, Eugene Fiume, Zvonko G. Vran...
JCS
2008
88views more  JCS 2008»
13 years 9 months ago
A privacy-aware access control system
The protection of privacy is an increasing concern in our networked society because of the growing amount of personal information that is being collected by a number of commercial...
Claudio Agostino Ardagna, Marco Cremonini, Sabrina...
CIC
2006
156views Communications» more  CIC 2006»
13 years 10 months ago
The Impact of Clustering in Distributed Topology Control
Abstract-- Topology control is the problem of assigning power levels to the nodes of an ad hoc network so as to maintain a specified network topology while minimizing energy consum...
Liang Zhao, Errol L. Lloyd