Sciweavers

2250 search results - page 138 / 450
» Authorizing applications in singularity
Sort
View
LPNMR
2005
Springer
15 years 3 months ago
Data Integration and Answer Set Programming
Abstract. The rapid expansion of the Internet and World Wide Web led to growing interest in data and information integration, which should be capable to deal with inconsistent and ...
Thomas Eiter
ACISP
1998
Springer
15 years 2 months ago
A Solution to Open Standard of PKI
PKI Public Key Infrastructure is fundamental for many security applications on the network. However, there are so many di erent kinds of PKI at current stage and they are not comp...
Qi He, Katia P. Sycara, Zhongmin Su
CORR
2008
Springer
115views Education» more  CORR 2008»
14 years 10 months ago
Kolmogorov complexity in perspective
We survey diverse approaches to the notion of information: from Shannon entropy to Kolmogorov complexity. Two of the main applications of Kolmogorov complexity are presented: rand...
Marie Ferbus-Zanda, Serge Grigorieff
CGA
2007
14 years 10 months ago
Optical Splitting Trees for High-Precision Monocular Imaging
The authors address the problem of designing and constructing efficient cameras that can simultaneously capture multiple pixel-aligned images for computational photography applic...
Morgan McGuire, Wojciech Matusik, Hanspeter Pfiste...
DATE
2007
IEEE
114views Hardware» more  DATE 2007»
15 years 4 months ago
Performance aware secure code partitioning
Many embedded applications exist where decisions are made using sensitive information. A critical issue in such applications is to ensure that data is accessed only by authorized ...
Sri Hari Krishna Narayanan, Mahmut T. Kandemir, Ri...