Sciweavers

1147 search results - page 14 / 230
» Transformation of Access Rights
Sort
View
EMISA
2009
Springer
14 years 3 months ago
Access Control for Monitoring System-Spanning Business Processes in Proviado
: Integrated process support is highly desirable in environments where data related to a particular (business) process are scattered over distributed, heterogeneous information sys...
Sarita Bassil, Manfred Reichert, Ralph Bobrik
DCC
2004
IEEE
14 years 8 months ago
Coding for Fast Access to Image Regions Defined by Pixel Range
Many technical imaging applications, like coding "images" of digital elevation maps, require extracting regions of compressed images in which the pixel values are within...
Amir Said, Sehoon Yea, William A. Pearlman
GLOBECOM
2007
IEEE
14 years 2 months ago
Analysis of the Contention Access Phase of a Reservation MAC Protocol for Wide-Area Data Intensive Sensor Networks
— We propose a contention based reservation MAC protocol for a collaborative sensing scenario involving a set of surveillance UAVs communicating with a hub. Data transmission rig...
Arindam Kumar Das, Sumit Roy, Abhijit Mahalanobis
CSFW
2009
IEEE
14 years 3 months ago
Updatable Security Views
Security views are a flexible and effective mechanism for controlling access to confidential information. Rather than allowing untrusted users to access source data directly, th...
J. Nathan Foster, Benjamin C. Pierce, Steve Zdance...
MCS
2007
Springer
13 years 8 months ago
Finite element approach to modelling evolution of 3D shape memory materials
A general finite element framework for the application to different types of phase transforming alloys and under general thermomechanical loadings is presented. The developed tec...
D. Roy Mahapatra, Roderick V. N. Melnik