Sciweavers

690 search results - page 79 / 138
» Extended Software Architecture Based on Security Patterns
Sort
View
TRIDENTCOM
2010
IEEE
15 years 1 months ago
G-Lab Deep: Cross-Layer Composition and Security for a Flexible Future Internet
The Internet enables the way how global businesses and communities communicate today. In the last years, however, new demands have collided with old designs, resulting in a complex...
Carsten Schmoll, Christian Henke, Dirk Hoffstadt, ...
SACMAT
2003
ACM
15 years 9 months ago
An approach to engineer and enforce context constraints in an RBAC environment
This paper presents an approach that uses special purpose RBAC constraints to base certain access control decisions on context information. In our approach a context constraint is...
Gustaf Neumann, Mark Strembeck
ASAP
2007
IEEE
134views Hardware» more  ASAP 2007»
15 years 5 months ago
Methodology and Toolset for ASIP Design and Development Targeting Cryptography-Based Applications
Network processors utilizing general-purpose instruction-set architectures (ISA) limit network throughput due to latency incurred from cryptography and hashing applications (AES, ...
David Montgomery, Ali Akoglu
140
Voted
DEXAW
1998
IEEE
98views Database» more  DEXAW 1998»
15 years 8 months ago
An Information Model for Nomadic Environments
In this paper we present a software architecture which facilitates nomadic computing in an Open Distributed Computing environment. We introduce a model for the description of mobi...
Andy Bond, Matthew Gallagher, Jadwiga Indulska
TVCG
2010
208views more  TVCG 2010»
15 years 2 months ago
Example-Based Human Motion Denoising
—With the proliferation of motion capture data, interest in removing noise and outliers from motion capture data has increased. In this paper, we introduce an efficient human mo...
Hui Lou, Jinxiang Chai