Sciweavers

1611 search results - page 226 / 323
» An Access Control Model for Video Database Systems
Sort
View
USS
2008
15 years 6 days ago
Verifying Compliance of Trusted Programs
In this paper, we present an approach for verifying that trusted programs correctly enforce system security goals when deployed. A trusted program is trusted to only perform safe ...
Sandra Rueda, Dave King 0002, Trent Jaeger
IADIS
2004
14 years 11 months ago
Preliminary Steps in Designing and Implementing a Privilege Verifier for PMI
We have designed and deployed a system that uses X.509 public-key certificates (PKC) and attribute certificates (AC) for access control. This includes an authorization service for...
Diana Berbecaru, Antonio Lioy
SIGMOD
2009
ACM
136views Database» more  SIGMOD 2009»
15 years 10 months ago
A comparison of approaches to large-scale data analysis
There is currently considerable enthusiasm around the MapReduce (MR) paradigm for large-scale data analysis [17]. Although the basic control flow of this framework has existed in ...
Andrew Pavlo, Erik Paulson, Alexander Rasin, Danie...
MM
2009
ACM
195views Multimedia» more  MM 2009»
15 years 4 months ago
The effectiveness of intelligent scheduling for multicast video-on-demand
As more and more video content is made available and accessed on-demand, content and service providers face challenges of scale. Today’s delivery mechanisms, especially unicast,...
Vaneet Aggarwal, A. Robert Calderbank, Vijay Gopal...
CVPR
2009
IEEE
16 years 5 months ago
Echocardiogram View Classification using Edge Filtered Scale-invariant Motion Features
In an 2D echocardiogram exam, an ultrasound probe samples the heart with 2D slices. Changing the orientation and position on the probe changes the slice viewpoint, altering the ...
Ritwik Kumar, Fei Wang, David Beymer, Tanveer Fath...