Sciweavers

345 search results - page 68 / 69
» A construction of a space-time code based on number theory
Sort
View
SACMAT
2006
ACM
13 years 11 months ago
The secondary and approximate authorization model and its application to Bell-LaPadula policies
We introduce the concept, model, and policy-specific algorithms for inferring new access control decisions from previous ones. Our secondary and approximate authorization model (...
Jason Crampton, Wing Leung, Konstantin Beznosov
PODC
2005
ACM
13 years 11 months ago
On the locality of bounded growth
Many large-scale networks such as ad hoc and sensor networks, peer-to-peer networks, or the Internet have the property that the number of independent nodes does not grow arbitrari...
Fabian Kuhn, Thomas Moscibroda, Roger Wattenhofer
SMA
2003
ACM
100views Solid Modeling» more  SMA 2003»
13 years 11 months ago
Free-form deformations via sketching and manipulating scalar fields
This paper presents a novel Scalar-field based Free-Form Deformation (SFFD) technique founded upon general flow constraints and implicit functions. In contrast to the traditiona...
Jing Hua, Hong Qin
BMCBI
2007
105views more  BMCBI 2007»
13 years 5 months ago
Finding regulatory elements and regulatory motifs: a general probabilistic framework
Over the last two decades a large number of algorithms has been developed for regulatory motif finding. Here we show how many of these algorithms, especially those that model bind...
Erik van Nimwegen
WWW
2004
ACM
14 years 6 months ago
Schemapath, a minimal extension to xml schema for conditional constraints
In the past few years, a number of constraint languages for XML documents has been proposed. They are cumulatively called schema languages or validation languages and they compris...
Claudio Sacerdoti Coen, Paolo Marinelli, Fabio Vit...