Sciweavers

1147 search results - page 145 / 230
» Transformation of Access Rights
Sort
View
CAV
2007
Springer
111views Hardware» more  CAV 2007»
14 years 29 days ago
Verification Across Intellectual Property Boundaries
In many industries, the share of software components provided by third-party suppliers is steadily increasing. As the suppliers seek to secure their intellectual property (IP) righ...
Sagar Chaki, Christian Schallhart, Helmut Veith
CLUSTER
2004
IEEE
14 years 21 days ago
An evaluation of the close-to-files processor and data co-allocation policy in multiclusters
In multicluster systems, and more generally, in grids, jobs may require co-allocation, i.e., the simultaneous allocation of resources such as processors and input files in multipl...
Hashim H. Mohamed, Dick H. J. Epema
USS
2008
13 years 11 months ago
Modeling the Trust Boundaries Created by Securable Objects
One of the most critical steps of any security review involves identifying the trust boundaries that an application is exposed to. While methodologies such as threat modeling can ...
Matt Miller
CIVR
2008
Springer
166views Image Analysis» more  CIVR 2008»
13 years 10 months ago
Content personalization and adaptation for three-screen services
Three-screen services provide the right solution for consumers to access rich multimedia resources by any device, anytime and anywhere. In this paper, we describe a prototype syst...
Zhu Liu, David C. Gibbon, Harris Drucker, Andrea B...
FPLAY
2008
13 years 10 months ago
Lessons from Brain Age on password memorability
User authentication involves establishing a user's right to access a system. Most user authentication is done with text passwords, which have advantages over other approaches...
Alain Forget, Sonia Chiasson, Robert Biddle