Sciweavers

2110 search results - page 414 / 422
» What is the complexity of a distributed computing system
Sort
View
SACMAT
2009
ACM
14 years 1 months ago
Ensuring spatio-temporal access control for real-world applications
Traditional access control models, such as Role-Based Access Control (RBAC), do not take into account contextual information, such as location and time, for making access decision...
Manachai Toahchoodee, Indrakshi Ray, Kyriakos Anas...
IROS
2007
IEEE
198views Robotics» more  IROS 2007»
14 years 1 months ago
Cooperation of heterogeneous, autonomous robots: A case study of humanoid and wheeled robots
Abstract— In this paper we present a case study of cooperation of a strongly heterogeneous robot team, composed of a highly articulated humanoid robot and a wheeled robot with la...
Jutta Kiener, Oskar von Stryk
CCS
2007
ACM
14 years 1 months ago
A simple and expressive semantic framework for policy composition in access control
In defining large, complex access control policies, one would like to compose sub-policies, perhaps authored by different organizations, into a single global policy. Existing po...
Glenn Bruns, Daniel S. Dantas, Michael Huth
CSB
2005
IEEE
210views Bioinformatics» more  CSB 2005»
14 years 1 months ago
Problem Solving Environment Approach to Integrating Diverse Biological Data Sources
Scientists face an ever-increasing challenge in investigating biological systems with high throughput experimental methods such as mass spectrometry and gene arrays because of the...
Eric G. Stephan, Kyle R. Klicker, Mudita Singhal, ...
VLDB
1995
ACM
112views Database» more  VLDB 1995»
13 years 11 months ago
OPOSSUM: Desk-Top Schema Management through Customizable Visualization
Several recent trends have changed the usage and users of schemas beyond those of a database administrator’s tool for describing database contents. Distribution of computing pow...
Eben M. Haber, Yannis E. Ioannidis, Miron Livny