Sciweavers

2061 search results - page 88 / 413
» Authorization for Metacomputing Applications
Sort
View
84
Voted
ACSAC
2005
IEEE
15 years 6 months ago
Uniform Application-level Access Control Enforcement of Organizationwide Policies
Fine-grained and expressive access control policies on application resources need to be enforced in applicationlevel code. Uniformly enforcing a single policy (referred to as the ...
Tine Verhanneman, Frank Piessens, Bart De Win, Wou...
105
Voted
IROS
2007
IEEE
152views Robotics» more  IROS 2007»
15 years 6 months ago
Characterizing optimally fault-tolerant manipulators based on relative manipulability indices
— In this article, the authors examine the problem of designing nominal manipulator Jacobians that are optimally fault tolerant to one or more joint failures. In this work, optim...
Rodney G. Roberts, Hyun Geun Yu, Anthony A. Maciej...
EMMCVPR
2007
Springer
15 years 6 months ago
Decomposing Document Images by Heuristic Search
Abstract. Document decomposition is a basic but crucial step for many document related applications. This paper proposes a novel approach to decompose document images into zones. I...
Dashan Gao, Yizhou Wang
ICWS
2004
IEEE
15 years 2 months ago
Access Control for Semantic Web Services
In this paper we make a contribution to the proof and trust layer of the Semantic Web layer cake by integrating two well founded techniques, namely DAML-S (for describing Web serv...
Sudhir Agarwal, Barbara Sprick
133
Voted
JUCS
2008
125views more  JUCS 2008»
15 years 17 days ago
Improving AEH Courses through Log Analysis
: Authoring in adaptive educational hypermedia environment is complex activity. In order to promote a wider application of this technology, the teachers and course designers need s...
César Vialardi Sacín, Javier Bravo, ...