Sciweavers

61 search results - page 10 / 13
» Using Graph Transformation Systems to Specify and Verify Dat...
Sort
View
KES
2008
Springer
13 years 7 months ago
A Secure Mediator for Integrating Multiple Level Access Control Policies
Abstract. We present a method for mapping security levels among the components of a distributed system where data in the local sources are represented in XML. Distributed data is i...
Isabel F. Cruz, Rigel Gjomemo, Mirko Orsini
ECCV
2004
Springer
14 years 9 months ago
Matching Tensors for Automatic Correspondence and Registration
Abstract. Complete 3-D modeling of a free-form object requires acquisition from multiple view-points. These views are then required to be registered in a common coordinate system b...
Ajmal S. Mian, Mohammed Bennamoun, Robyn A. Owens
SIGSOFT
2007
ACM
14 years 8 months ago
Quantitative verification: models techniques and tools
Automated verification is a technique for establishing if certain properties, usually expressed in temporal logic, hold for a system model. The model can be defined using a high-l...
Marta Z. Kwiatkowska
EDBT
2006
ACM
177views Database» more  EDBT 2006»
14 years 7 months ago
Authorization-Transparent Access Control for XML Under the Non-Truman Model
In authorization-transparent access control, users formulate their queries against the database schema rather than against authorization views that transform and hide data. The Tru...
Alberto O. Mendelzon, Renée J. Miller, Yaro...
SIGMOD
2004
ACM
165views Database» more  SIGMOD 2004»
14 years 7 months ago
Industrial-Strength Schema Matching
Schema matching identifies elements of two given schemas that correspond to each other. Although there are many algorithms for schema matching, little has been written about build...
Philip A. Bernstein, Sergey Melnik, Michalis Petro...