Sciweavers

143 search results - page 29 / 29
» A Formalization of Distributed Authorization with Delegation
Sort
View
WPES
2003
ACM
13 years 11 months ago
Anonymous credentials with biometrically-enforced non-transferability
We present a model and protocol for anonymous credentials. Rather than using deterrents to ensure non-transferability, our model uses secure hardware with biometric authentication...
Russell Impagliazzo, Sara Miner More
CASCON
2007
138views Education» more  CASCON 2007»
13 years 7 months ago
SLA-driven business process management in SOA
The management of non-functional goals, or Service Level Agreements (SLA), in the development of business processes in a Service Oriented Architecture often requires much manual a...
Vinod Muthusamy, Hans-Arno Jacobsen, Phil Coulthar...
BIOINFORMATICS
2005
93views more  BIOINFORMATICS 2005»
13 years 6 months ago
Donuts, scratches and blanks: robust model-based segmentation of microarray images
Inner holes, artifacts and blank spots are common in microarray images, but current image analysis methods do not pay them enough attention. We propose a new robust model-based me...
Qunhua Li, Chris Fraley, Roger Eugene Bumgarner, K...