Sciweavers

807 search results - page 90 / 162
» Term Rewriting for Access Control
Sort
View
LANOMS
2007
IEEE
149views Education» more  LANOMS 2007»
15 years 9 months ago
Management Issues on Wireless Mesh Networks
—Wireless Mesh Networks (WMN) are emerging as a flexible and low-cost alternative to provide digital inclusion through multi-hop communications, supporting applications from las...
Jairo L. Duarte, Diego G. Passos, Rafael L. Valle,...
130
Voted
STORAGESS
2005
ACM
15 years 9 months ago
Toward securing untrusted storage without public-key operations
Adding security capabilities to shared, remote and untrusted storage file systems leads to performance degradation that limits their use. Public-key cryptographic primitives, wid...
Dalit Naor, Amir Shenhav, Avishai Wool
DRM
2005
Springer
15 years 9 months ago
Statistical audio watermarking algorithm based on perceptual analysis
In this paper, we describe a novel statistical audio watermarking scheme. Under the control of the masking thresholds, watermark is embedded adaptively and transparently in the pe...
Xiaomei Quan, Hongbin Zhang
129
Voted
ECOOP
1997
Springer
15 years 7 months ago
Subtyping Is Not a Good "Match" for Object-Oriented Languages
We present the design and rationale of a new statically-typed object-oriented language, LOOM. LOOM retains most of the features of the earlier language PolyTOIL. However the subtyp...
Kim B. Bruce, Leaf Petersen, Adrian Fiech
VLDB
1993
ACM
113views Database» more  VLDB 1993»
15 years 7 months ago
An Active Object-Oriented Database: A Multi-Paradigm Approach to Constraint Management
Mb describe the design and implementation of a constraint management facility for our active object-oriented database system called Jasmine/A. The facility includes integrity cons...
Hiroshi Ishikawa, Kazumi Kubota