Sciweavers

2250 search results - page 67 / 450
» Authorizing applications in singularity
Sort
View
ECIS
2000
14 years 11 months ago
Citizen Information Services using Internet Technologies
This paper presents a Web-based, database-oriented set of applications, namely "Public Information" and "Electronic Voting", to support information services (ex...
Christos Bouras, Spyridon Kastaniotis, Vassilis Tr...
IV
1999
IEEE
96views Visualization» more  IV 1999»
15 years 2 months ago
A Semantic-Centric Approach to Information Visualization
A semantic-centric approach to information visualization is described in this paper. In contrast to the conventional document-centric approaches, the semantic-centric approach foc...
Chaomei Chen, Les Carr
BMVC
1998
14 years 11 months ago
Automatic Processing of Document Annotations
A common authoring technique involves making annotations on a printed draft and then typing the corrections into a computer at a later date. In this paper, we describe a system th...
Jacob Stevens, Andrew H. Gee, Chris Dance
IEEECIT
2010
IEEE
14 years 8 months ago
Virtual Security Kernel: A Component-Based OS Architecture for Self-Protection
—This paper presents VSK, a lightweight adaptable OS authorization architecture suitable for self-protection of pervasive devices. A “virtual” management plane, separate from...
Ruan He, Marc Lacoste, Jean Leneutre
CORR
2010
Springer
152views Education» more  CORR 2010»
14 years 10 months ago
Microlocal Analysis of the Geometric Separation Problem
Image data are often composed of two or more geometrically distinct constituents; in galaxy catalogs, for instance, one sees a mixture of pointlike structures (galaxy supercluster...
David L. Donoho, Gitta Kutyniok