Sciweavers

1300 search results - page 165 / 260
» Association Schemoids and Their Categories
Sort
View
SACMAT
2003
ACM
15 years 4 months ago
An access control model for dynamic client-side content
The focus of access control in client/server environments is on protecting sensitive server resources by determining whether or not a client is authorized to access those resource...
Adam Hess, Kent E. Seamons
DAS
2010
Springer
15 years 4 months ago
Document analysis issues in reading optical scan ballots
Optical scan voting is considered by many to be the most trustworthy option for conducting elections because it provides an independently verifiable record of each voter’s inte...
Daniel P. Lopresti, George Nagy, Elisa H. Barney S...
CBMS
2000
IEEE
15 years 3 months ago
Use of Shape Models to Search Digitized Spine X-rays
We are building a biomedical information resource consisting of digitized x-ray images and associated textual data from national health surveys. This resource, the Web-based Medic...
L. Rodney Long, George R. Thoma
CCS
2006
ACM
15 years 2 months ago
A scalable approach to attack graph generation
Attack graphs are important tools for analyzing security vulnerabilities in enterprise networks. Previous work on attack graphs has not provided an account of the scalability of t...
Xinming Ou, Wayne F. Boyer, Miles A. McQueen
EMSOFT
2006
Springer
15 years 2 months ago
Incremental schedulability analysis of hierarchical real-time components
Embedded systems are complex as a whole but consist of smaller independent modules minimally interacting with each other. This structure makes embedded systems amenable to composi...
Arvind Easwaran, Insik Shin, Oleg Sokolsky, Insup ...