Sciweavers

1458 search results - page 198 / 292
» Extended Term Rewriting Systems
Sort
View
106
Voted
TISSEC
2010
121views more  TISSEC 2010»
14 years 11 months ago
Privacy-aware role-based access control
Privacy has been acknowledged to be a critical requirement for many business (and non-business) environments. Therefore, the definition of an expressive and easy-to-use privacyre...
Qun Ni, Elisa Bertino, Jorge Lobo, Carolyn Brodie,...
AROBOTS
2010
194views more  AROBOTS 2010»
14 years 11 months ago
Computationally efficient solutions for tracking people with a mobile robot: an experimental evaluation of Bayesian filters
Abstract Modern service robots will soon become an essential part of modern society. As they have to move and act in human environments, it is essential for them to be provided wit...
Nicola Bellotto, Huosheng Hu
SIGMOD
2011
ACM
219views Database» more  SIGMOD 2011»
14 years 3 months ago
Context-sensitive ranking for document retrieval
We study the problem of context-sensitive ranking for document retrieval, where a context is defined as a sub-collection of documents, and is specified by queries provided by do...
Liang Jeff Chen, Yannis Papakonstantinou
DAC
2011
ACM
14 years 19 days ago
ChronOS Linux: a best-effort real-time multiprocessor Linux kernel
We present ChronOS Linux, a best-effort real-time Linux kernel for chip multiprocessors (CMPs). ChronOS addresses the intersection of three problem spaces: a) OS-support for obta...
Matthew Dellinger, Piyush Garyali, Binoy Ravindran
111
Voted
SACMAT
2005
ACM
15 years 6 months ago
Peer-to-peer access control architecture using trusted computing technology
It has been recognized for some time that software alone does not provide an adequate foundation for building a high-assurance trusted platform. The emergence of industry-standard...
Ravi S. Sandhu, Xinwen Zhang