Sciweavers

1611 search results - page 178 / 323
» An Access Control Model for Video Database Systems
Sort
View
VRML
1998
ACM
15 years 2 months ago
Using VRML as an Interface to the 3D Data Warehouse
In its current state, VRML does not provide support for interaction and on-line access to databases, even though these are two fundamental issues for business applications. We hav...
Volker Coors, Volker Jung
AUTOMATICA
2008
82views more  AUTOMATICA 2008»
14 years 10 months ago
Iterative minimization of H2 control performance criteria
Data-based control design methods most often consist of iterative adjustment of the controller's parameters towards the parameter values which minimize an H2 performance crit...
Alexandre S. Bazanella, Michel Gevers, Ljubisa Mis...
HT
2004
ACM
15 years 3 months ago
Automatic generation of hypertext system repositories: a model driven approach
In this paper, we present a model-driven methodology and toolset for automatic generation of hypertext system repositories. Our code generator, called Bamboo, is based on a Contai...
E. James Whitehead Jr., Guozheng Ge, Kai Pan
JCS
2008
69views more  JCS 2008»
14 years 10 months ago
Non-delegatable authorities in capability systems
We present a novel technique, known as the non-delegatable authority (NDA), for distributing authority to unconfined subjects in capability systems that prevents them from sharing...
Toby C. Murray, Duncan A. Grove
PERCOM
2005
ACM
15 years 9 months ago
Unleashing the Power of Wearable Devices in a SIP Infrastructure
The Session Initiation Protocol (SIP) has been widely adopted for Instant Messaging (IM) and VoIP telephony both by the enterprise and in service provider systems. Till now, SIP f...
Arup Acharya, Stefan Berger, Chandrasekhar Narayan...