Sciweavers

2250 search results - page 128 / 450
» Authorizing applications in singularity
Sort
View
ECOOPW
1999
Springer
15 years 2 months ago
The Role of Trust Management in Distributed Systems Security
Existing authorization mechanisms fail to provide powerful and robust tools for handling security at the scale necessary for today's Internet. These mechanisms are coming unde...
Matt Blaze, Joan Feigenbaum, Angelos D. Keromytis
WWW
2005
ACM
15 years 10 months ago
CubeSVD: a novel approach to personalized Web search
As the competition of Web search market increases, there is a high demand for personalized Web search to conduct retrieval incorporating Web users' information needs. This pa...
Jian-Tao Sun, Hua-Jun Zeng, Huan Liu, Yuchang Lu, ...
VCBM
2010
14 years 4 months ago
A General Approach to Model Biomedical Data from 3D Unorganised Point Clouds with Medial Scaffolds
We present the latest developments in modeling 3D biomedical data via the Medial Scaffold (MS), a 3D acyclic oriented graph representation of the Medial Axis (MA) [LK07, SP08]. Th...
Frederic F. Leymarie, Ming-Ching Chang, Celina Imi...
CHI
2006
ACM
15 years 10 months ago
Collective creation and sense-making of mobile media
Traditionally, mobile media sharing and messaging has been studied from the perspective of an individual author making media available to other users. With the aim of supporting s...
Antti Salovaara, Giulio Jacucci, Antti Oulasvirta,...
NOMS
2008
IEEE
15 years 4 months ago
Towards an efficient implementation of traceback mechanisms in autonomous systems
—One of the major problems due to denial of service attacks is the identification of fault packets. To resolve this problem, several IP traceback methods have been defined. In th...
Karima Boudaoud, F. LeBorgne