Sciweavers

410 search results - page 77 / 82
» Embedded Operating System Energy Analysis and Macro-Modeling
Sort
View
SACMAT
2003
ACM
15 years 4 months ago
Cooperative role-based administration
In large organizations the administration of access privileges (such as the assignment of an access right to a user in a particular role) is handled cooperatively through distribu...
Horst Wedde, Mario Lischka
CVPR
2012
IEEE
13 years 5 months ago
Foreground Detection Using Spatiotemporal Projection Kernels
Foreground detection is at the core of many video processing tasks. In this paper, we propose a novel video foreground detection method that exploits the statistics of 3D space-tim...
Y. Moshe, H. Hel-Or, and Y. Hel-Or
SOUPS
2006
ACM
15 years 5 months ago
Intentional access management: making access control usable for end-users
The usability of access control mechanisms in modern distributed systems has been widely criticized but little studied. In this paper, we carefully examine one such widely deploye...
Xiang Cao, Lee Iverson
ACSAC
2010
IEEE
14 years 9 months ago
Porscha: policy oriented secure content handling in Android
The penetration of cellular networks worldwide and emergence of smart phones has led to a revolution in mobile content. Users consume diverse content when, for example, exchanging...
Machigar Ongtang, Kevin R. B. Butler, Patrick Drew...
POPL
2009
ACM
16 years 8 days ago
Automatic modular abstractions for linear constraints
c Modular Abstractions for Linear Constraints David Monniaux VERIMAG June 27, 2008 se a method for automatically generating abstract transformers for static by abstract interpreta...
David Monniaux