Sciweavers

177 search results - page 23 / 36
» Towards temporal access control in cloud computing
Sort
View
GIS
2008
ACM
13 years 8 months ago
Towards a scalable model for location privacy
With the growth of wireless and mobile technologies, we are witnessing an increase in location-based services (LBS). Although LBS provide enhanced functionalities, they open up ne...
Nayot Poolsappasit, Indrakshi Ray
ICSOC
2009
Springer
13 years 5 months ago
Integrating Complex Events for Collaborating and Dynamically Changing Business Processes
Business processes must become agile, respond to changes in the business environment in a timely manner and quickly adapt themselves to new conditions. Event-Driven Business Proces...
Rainer von Ammon, Thomas Ertlmaier, Opher Etzion, ...
VIS
2007
IEEE
235views Visualization» more  VIS 2007»
14 years 9 months ago
Efficient Surface Reconstruction using Generalized Coulomb Potentials
We propose a novel, geometrically adaptive method for surface reconstruction from noisy and sparse point clouds, without orientation information. The method employs a fast convecti...
Andrei C. Jalba, Jos B. T. M. Roerdink
HPCS
2002
IEEE
14 years 22 days ago
An Evaluation of Thread Migration for Exploiting Distributed Array Locality
Thread migration is one approach to remote memory accesses on distributed memory parallel computers. In thread migration, threads of control migrate between processors to access d...
Stephen Jenks, Jean-Luc Gaudiot
SAC
2009
ACM
14 years 2 months ago
SQLProb: a proxy-based architecture towards preventing SQL injection attacks
SQL injection attacks (SQLIAs) consist of maliciously crafted SQL inputs, including control code, used against Databaseconnected Web applications. To curtail the attackers’ abil...
Anyi Liu, Yi Yuan, Duminda Wijesekera, Angelos Sta...