Sciweavers

1147 search results - page 48 / 230
» Transformation of Access Rights
Sort
View
CN
2007
95views more  CN 2007»
13 years 8 months ago
A survey on emerging broadband wireless access technologies
Wireless broadband technologies provide ubiquitous broadband access to wireless users, enabling services that were available only to wireline users. In this paper, we summarize em...
Mehmet S. Kuran, Tuna Tugcu
ICIP
2005
IEEE
14 years 10 months ago
Face and eye rectification in video conference using affine transform
The lack of eye contact in video conference degrades the user's experience. This problem has been known and studied for many years. There are hardware-based solutions to the ...
Ben Yip
ASAP
2006
IEEE
110views Hardware» more  ASAP 2006»
14 years 2 months ago
Loop Transformation Methodologies for Array-Oriented Memory Management
Abstract – The storage requirements in data-dominant signal processing systems, whose behavior is described by arraybased, loop-organized algorithmic specifications, have an imp...
Florin Balasa, Per Gunnar Kjeldsberg, Martin Palko...
GI
2008
Springer
13 years 9 months ago
A Novel Conceptual Model for Accessing Distributed Data and Applications, as well as Devices
: As data and services are increasingly distributed in the network, rather than stored in a fixed location, one can imagine a scenario in which the Personal Computer, intended as a...
Lucia Terrenghi, Thomas Lang
CCS
2003
ACM
14 years 1 months ago
Formal access control analysis in the software development process
Security is a crucial aspect in any modern software system. To ensure security in the final product, security requirements must be considered in the entire software development p...
Manuel Koch, Francesco Parisi-Presicce