Sciweavers

3357 search results - page 145 / 672
» Controlling Complexity
Sort
View
ACSC
2009
IEEE
15 years 8 months ago
Privacy-aware Access Control with Generalization Boundaries
Privacy is today an important concern for both data providers and data users. Data generalization can provide significant protection of an individual’s privacy, which means the...
Min Li, Hua Wang, Ashley W. Plank
ICIP
2003
IEEE
16 years 3 months ago
Rate control for JVT video coding scheme with HRD considerations
The recent JVT video coding scheme (MPEG-4 AVC/H.264) is a promising technique due to its high coding efficiency. Hypothetical Reference Decoder (HRD) is a very important part in ...
Siwei Ma, Wen Gao, Feng Wu, Yan Lu
GRID
2007
Springer
15 years 8 months ago
Fine-grained access control for GridFTP using SecPAL
– Grid access control policy languages today are generally one of two extremes: either extremely simplistic, or overly complex and challenging for even security experts to use. I...
Marty Humphrey, Sang-Min Park, Jun Feng, Norm Beek...
CDC
2009
IEEE
132views Control Systems» more  CDC 2009»
15 years 6 months ago
Robust stability of multi-hop control networks
Abstract— We propose formal models for analyzing robustness of multi-hop control networks, where data from sensors to controllers and from controllers to actuators is sent throug...
Gera Weiss, Alessandro D'Innocenzo, Rajeev Alur, K...
EMISA
2009
Springer
15 years 8 months ago
Access Control for Monitoring System-Spanning Business Processes in Proviado
: Integrated process support is highly desirable in environments where data related to a particular (business) process are scattered over distributed, heterogeneous information sys...
Sarita Bassil, Manfred Reichert, Ralph Bobrik