Sciweavers

1147 search results - page 27 / 230
» Transformation of Access Rights
Sort
View
CARDIS
2000
Springer
107views Hardware» more  CARDIS 2000»
14 years 29 days ago
JCCap: Capability-based Access Control for Java Card
: This paper describes JCCap, a protection facility for cooperating applications in the context of Java Card. It enables the control of access rights between mutually suspicious ap...
Daniel Hagimont, Jean-Jacques Vandewalle
MOBICOM
2010
ACM
13 years 8 months ago
The spaces between us: setting and maintaining boundaries in wireless spectrum access
Guardbands are designed to insulate transmissions on adjacent frequencies from mutual interference. As more devices in a given area are packed into orthogonal wireless channels, c...
Lei Yang, Ben Y. Zhao, Haitao Zheng
ICCAD
2003
IEEE
159views Hardware» more  ICCAD 2003»
14 years 5 months ago
Array Composition and Decomposition for Optimizing Embedded Applications
Optimizing array accesses is extremely critical in embedded computing as many embedded applications make use of arrays (in form of images, video frames, etc). Previous research co...
Guilin Chen, Mahmut T. Kandemir, A. Nadgir, Ugur S...
AGTIVE
2007
Springer
13 years 10 months ago
Adaptable Support for Queries and Transformations for the DRAGOS Graph-Database
Abstract. The DRAGOS database eases the development of graphbased applications by providing a uniform graph-oriented data storage facility. In this paper, we extend the existing da...
Erhard Weinell
ICDM
2006
IEEE
131views Data Mining» more  ICDM 2006»
14 years 2 months ago
Transforming Semi-Honest Protocols to Ensure Accountability
The secure multi-party computation (SMC) model provides means for balancing the use and confidentiality of distributed data. This is especially important in the field of privacy...
Wei Jiang, Chris Clifton