Making correct access-control decisions is central to security, which in turn requires accounting correctly for the identity, credentials, roles, authority, and privileges of users...
Thumrongsak Kosiyatrakul, Susan Older, Shiu-Kai Ch...
Copyright 2004 IEEE. Published in Conference on Computer Vision and Pattern Recognition (CVPR-2004), June 27 - July 2, 2004, Washington DC. Personal use of this material is permit...
A database application differs form regular applications in that some of its inputs may be database queries. The program will execute the queries on a database and may use any re...
Networked, distributed real world sensing is an increasingly prominent topic in computing and has quickly expanded from resource constrained “sensor networks” measuring simple...
MAD (Movie Authoring and Design) is a novel design and authoring system that facilitates the process of creating dynamic visual presentations such as motion pictures and lecture-d...
Ronald Baecker, Alan J. Rosenthal, Naomi Friedland...