Sciweavers

1492 search results - page 122 / 299
» Accessibility and computer science education
Sort
View
CSE
2009
IEEE
15 years 7 months ago
A Framework for Enforcing Constrained RBAC Policies
—Constraints are an important part of role-based access control policies. The safety or security of a system is maintained by enforcing constraints that are specified in the pol...
Jason Crampton, Hemanth Khambhammettu
ICS
2005
Tsinghua U.
15 years 6 months ago
Reducing latencies of pipelined cache accesses through set prediction
With the increasing performance gap between the processor and the memory, the importance of caches is increasing for high performance processors. However, with reducing feature si...
Aneesh Aggarwal
119
Voted
CCS
2009
ACM
15 years 7 months ago
Proximity-based access control for implantable medical devices
We propose a proximity-based access control scheme for implantable medical devices (IMDs). Our scheme is based on ultrasonic distancebounding and enables an implanted medical devi...
Kasper Bonne Rasmussen, Claude Castelluccia, Thoma...
90
Voted
CHI
2008
ACM
16 years 1 months ago
Informatics at UC Irvine
Computer Science, as a single discipline, can no longer speak to the broad relevance of digital technologies in society. The Department of Informatics in the Donald Bren School of...
Paul Dourish, Gillian R. Hayes, Lilly Irani, Charl...
94
Voted
RELMICS
2009
Springer
15 years 7 months ago
Collagories for Relational Adhesive Rewriting
We define collagories essentially as “distributive allegories without zero morphisms”, and show that they are sufficient for accommodating the relation-algebraic approach to ...
Wolfram Kahl