Sciweavers

9245 search results - page 1785 / 1849
» Virtual
Sort
View
CCS
2008
ACM
13 years 10 months ago
A security architecture for transient trust
In extraordinary situations, certain individuals may require access to information for which they are not normally authorized. For example, to facilitate rescue of people trapped ...
Cynthia E. Irvine, Timothy E. Levin, Paul C. Clark...
CCS
2008
ACM
13 years 10 months ago
The risk-utility tradeoff for IP address truncation
Network operators are reluctant to share traffic data due to security and privacy concerns. Consequently, there is a lack of publicly available traces for validating and generaliz...
Martin Burkhart, Daniela Brauckhoff, Martin May, E...
CANDC
2005
ACM
13 years 10 months ago
Computational schemes for biomimetic sculpture
A prototype system for the automatic evolution of biomimetic structures using structural automata is described and its utility for generating digital sculpture is demonstrated. Sc...
Brower Hatcher, Karl Aspelund, Andrew R. Willis, J...
CASES
2005
ACM
13 years 10 months ago
MTSS: multi task stack sharing for embedded systems
Out-of-memory errors are a serious source of unreliability in most embedded systems [22]. Applications run out of main memory because of the frequent difficulty of estimating the ...
Bhuvan Middha, Matthew Simpson, Rajeev Barua
ESCIENCE
2006
IEEE
13 years 10 months ago
Domain Based Access Control Model for Distributed Collaborative Applications
This paper describes the design and development of a flexible domain-based access control infrastructure for distributed Collaborative Environments. The paper proposes extensions ...
Yuri Demchenko, Cees de Laat, Leon Gommans, Ren&ea...
« Prev « First page 1785 / 1849 Last » Next »