Sciweavers

2061 search results - page 180 / 413
» Authorization for Metacomputing Applications
Sort
View
TRUSTBUS
2005
Springer
15 years 10 months ago
A Privacy Enhancement Mechanism for Location Based Service Architectures Using Transaction Pseudonyms
Abstract. Third party service providers are starting to use advanced location services based on area or periodical notification in order to develop innovative applications. Howeve...
Oliver Jorns, Oliver Jung, Julia Gross, Sandford B...
AVBPA
2005
Springer
248views Biometrics» more  AVBPA 2005»
15 years 10 months ago
A New On-Line Model Quality Evaluation Method for Speaker Verification
The accurate selection of the utterances is very important to obtain right estimated speaker models in speaker verification. In this sense, it is important to determine the quality...
Javier R. Saeta, Javier Hernando
UIST
2004
ACM
15 years 10 months ago
ScreenCrayons: annotating anything
ScreenCrayons is a system for collecting annotations on any type of document or visual information from any application. The basis for the system is a screen capture upon which th...
Dan R. Olsen, Trent Taufer, Jerry Alan Fails
ECRTS
2003
IEEE
15 years 9 months ago
A Synthetic Utilization Bound for Aperiodic Tasks with Resource Requirements
Utilization bounds for schedulability of aperiodic tasks are new in real-time scheduling literature. All aperiodic bounds known to date apply only to independent tasks. They eithe...
Tarek F. Abdelzaher, Vivek Sharma
ICDCSW
2003
IEEE
15 years 9 months ago
Privilege Delegation and Agent-Oriented Access Control in Naplet
Access control in existing Java-based mobile agents is mostly based on code source due to limitations of early Java security architecture. That is, authorization is based on where...
Cheng-Zhong Xu, Song Fu