Sciweavers

427 search results - page 60 / 86
» Applying Aspect-Orientation in Designing Security Systems: A...
Sort
View
151
Voted
IDMS
2001
Springer
133views Multimedia» more  IDMS 2001»
15 years 6 months ago
An Access Control Architecture for Metropolitan Area Wireless Networks
This paper introduces a novel access control architecture for publicly accessible, wireless networks. The architecture was designed to address the requirements obtained from a case...
Stefan Schmid, Joe Finney, Maomao Wu, Adrian Frida...
PVLDB
2010
117views more  PVLDB 2010»
15 years 8 days ago
Building Disclosure Risk Aware Query Optimizers for Relational Databases
Many DBMS products in the market provide built in encryption support to deal with the security concerns of the organizations. This solution is quite effective in preventing data ...
Mustafa Canim, Murat Kantarcioglu, Bijit Hore, Sha...
HICSS
2007
IEEE
89views Biometrics» more  HICSS 2007»
15 years 8 months ago
The Emergence of Standards: A Meta-Analysis
This paper provides a list of factors that influence the outcome of standard battles. We have developed this list by performing a meta-analysis of 103 papers. An extensive literat...
Geerten van de Kaa, Henk Jan de Vries, Eric van He...
115
Voted
CASES
2004
ACM
15 years 7 months ago
A post-compiler approach to scratchpad mapping of code
ScratchPad Memories (SPMs) are commonly used in embedded systems because they are more energy-efficient than caches and enable tighter application control on the memory hierarchy...
Federico Angiolini, Francesco Menichelli, Alberto ...
127
Voted
ICRA
2003
IEEE
141views Robotics» more  ICRA 2003»
15 years 7 months ago
Knot planning from observation
—The learning from observation (LFO) paradigm has been widely applied in various types of robot systems. It helps reduce the work of the programmer. However, the applications of ...
Takuma Morita, Jun Takamatsu, Koichi Ogawara, Hiro...