Sciweavers

807 search results - page 60 / 162
» Term Rewriting for Access Control
Sort
View
143
Voted
SI3D
2005
ACM
15 years 9 months ago
User interfaces for interactive control of physics-based 3D characters
We present two user interfaces for the interactive control of dynamically-simulated characters. The first interface uses an ‘action palette’ and targets sports prototyping ap...
Peng Zhao, Michiel van de Panne
160
Voted
SIGMOD
2010
ACM
221views Database» more  SIGMOD 2010»
15 years 8 months ago
Low overhead concurrency control for partitioned main memory databases
Database partitioning is a technique for improving the performance of distributed OLTP databases, since “single partition” transactions that access data on one partition do no...
Evan P. C. Jones, Daniel J. Abadi, Samuel Madden
144
Voted
CCS
2004
ACM
15 years 9 months ago
Private inference control
Access control can be used to ensure that database queries pertaining to sensitive information are not answered. This is not enough to prevent users from learning sensitive inform...
David P. Woodruff, Jessica Staddon
120
Voted
CSE
2009
IEEE
15 years 10 months ago
Usable Privacy Controls for Blogs
—Web 2.0 applications, including blogs, wikis and social networking sites, pose challenging privacy issues. Many users are unaware that search engines index personal information ...
Michael Hart, Claude Castille, Rob Johnson, Amanda...
115
Voted
ICC
2007
IEEE
142views Communications» more  ICC 2007»
15 years 10 months ago
Simulative Analysis of a Multi-Cell Admission Control Algorithm in WCDMA Networks
— It has for long been recognized that in multi-cell wide-band code division multiple access (WCDMA) networks the admission of a new session into the system can have undesirable ...
Gábor Fodor, Gustavo Azzolin