Sciweavers

79 search results - page 11 / 16
» The Effect of Trust Assumptions on the Elaboration of Securi...
Sort
View
IEEEARES
2006
IEEE
14 years 1 months ago
Modeling permissions in a (U/X)ML world
— Service Oriented Architectures with underlying technologies like web services and web services orchestration have opened the door to a wide range of novel application scenarios...
Muhammad Alam, Ruth Breu, Michael Hafner
CCS
2008
ACM
13 years 9 months ago
Reconsidering physical key secrecy: teleduplication via optical decoding
The access control provided by a physical lock is based on the assumption that the information content of the corresponding key is private -- that duplication should require eithe...
Benjamin Laxton, Kai Wang, Stefan Savage
SPAA
2003
ACM
14 years 22 days ago
The effect of communication costs in solid-state quantum computing architectures
Quantum computation has become an intriguing technology with which to attack difficult problems and to enhance system security. Quantum algorithms, however, have been analyzed un...
Dean Copsey, Mark Oskin, Tzvetan S. Metodi, Freder...
CVPR
2004
IEEE
14 years 9 months ago
Multiple Kernel Tracking with SSD
Kernel-based objective functions optimized using the mean shift algorithm have been demonstrated as an effective means of tracking in video sequences. The resulting algorithms com...
Gregory D. Hager, Maneesh Dewan, Charles V. Stewar...
CERA
2004
95views more  CERA 2004»
13 years 7 months ago
A New Design for Production (DFP) Methodology with Two Case Studies
Concurrent engineering (CE) design demands the consideration of product life-cycle issues in the early product design stage. Among various life-cycle issues, this work concentrate...
Lee Ming Wong, G. Gary Wang, Doug Strong