Sciweavers

134 search results - page 4 / 27
» ccs 2004
Sort
View
CCS
2004
ACM
14 years 3 months ago
Security policies for downgrading
A long-standing problem in information security is how to specify and enforce expressive security policies that control information flow while also permitting information release...
Stephen Chong, Andrew C. Myers
CCS
2004
ACM
14 years 3 months ago
Concealing complex policies with hidden credentials
Hidden credentials are useful in protecting sensitive resource requests, resources, policies, and credentials. We propose a significant performance improvement when implementing ...
Robert W. Bradshaw, Jason E. Holt, Kent E. Seamons
JBI
2008
104views Bioinformatics» more  JBI 2008»
13 years 9 months ago
Ontology-enhanced automatic chief complaint classification for syndromic surveillance
Emergency department free-text chief complaints (CCs) are a major data source for syndromic surveillance. CCs need to be classified into syndromic categories for subsequent automa...
Hsin-Min Lu, Daniel Zeng, Lea Trujillo, Ken Komats...
FOSSACS
2004
Springer
14 years 1 months ago
On the Expressiveness of Infinite Behavior and Name Scoping in Process Calculi
In the literature there are several CCS-like process calculi differing in the constructs for the specification of infinite behavior and in the scoping rules for channel names. In t...
Pablo Giambiagi, Gerardo Schneider, Frank D. Valen...
EGPGV
2004
Springer
119views Visualization» more  EGPGV 2004»
14 years 3 months ago
Parallel Implicit Integration for Cloth Animations on Distributed Memory Architectures
We present a parallel cloth simulation engine designed for distributed memory parallel architectures, in particular clusters built of commodity components. We focus on efficient ...
Michael Keckeisen, Wolfgang Blochinger