Sciweavers

2272 search results - page 375 / 455
» Validity Invariants and Effects
Sort
View
INFOCOM
2012
IEEE
12 years 15 days ago
Towards temporal access control in cloud computing
—Access control is one of the most important security mechanisms in cloud computing. Attribute-based access control provides a flexible approach that allows data owners to integ...
Yan Zhu, Hongxin Hu, Gail-Joon Ahn, Dijiang Huang,...
KDD
2012
ACM
205views Data Mining» more  KDD 2012»
12 years 15 days ago
Intrusion as (anti)social communication: characterization and detection
A reasonable definition of intrusion is: entering a community to which one does not belong. This suggests that in a network, intrusion attempts may be detected by looking for com...
Qi Ding, Natallia Katenka, Paul Barford, Eric D. K...
CVPR
2012
IEEE
12 years 14 days ago
Articulated people detection and pose estimation: Reshaping the future
State-of-the-art methods for human detection and pose estimation require many training samples for best performance. While large, manually collected datasets exist, the captured v...
Leonid Pishchulin, Arjun Jain, Mykhaylo Andriluka,...
DAC
2012
ACM
12 years 14 days ago
Analysis of DC current crowding in through-silicon-vias and its impact on power integrity in 3D ICs
Due to the large geometry of through-silicon-vias (TSVs) and their connections to the power grid, significant current crowding can occur in 3D ICs. Prior works model TSVs and pow...
Xin Zhao, Michael Scheuermann, Sung Kyu Lim
TMC
2012
12 years 13 days ago
MAC in Motion: Impact of Mobility on the MAC of Drive-Thru Internet
—The pervasive adoption of IEEE 802.11 radios in the past decade has made possible for the easy Internet access from a vehicle, notably drive-thru Internet. Originally designed f...
Tom H. Luan, Xinhua Ling, Xuemin Shen