Sciweavers

734 search results - page 74 / 147
» Feature analysis for architectural evaluation methods
Sort
View
140
Voted
SIMULATION
2010
178views more  SIMULATION 2010»
14 years 10 months ago
Application-level Simulation for Network Security
We introduce and describe a novel network simulation tool called NeSSi (Network Security Simulator). NeSSi incorporates a variety of features relevant to network security distingu...
Stephan Schmidt, Rainer Bye, Joël Chinnow, Ka...
COMPSAC
2010
IEEE
15 years 1 months ago
Representing and Reasoning about Web Access Control Policies
The advent of emerging technologies such as Web services, service-oriented architecture, and cloud computing has enabled us to perform business services more efficiently and effect...
Gail-Joon Ahn, Hongxin Hu, Joohyung Lee, Yunsong M...
MMM
2010
Springer
157views Multimedia» more  MMM 2010»
16 years 19 days ago
A Novel Trajectory Clustering Approach for Motion Segmentation
We propose a novel clustering scheme for spatio-temporal segmentation of sparse motion fields obtained from feature tracking. The approach allows for the segmentation of meaningfu...
Matthias Zeppelzauer, Maia Zaharieva, Dalibor Mitr...
158
Voted
ICDAR
2009
IEEE
15 years 1 months ago
PENTOOLS - A MATLAB Toolkit for On-line Pen-Based Data Experimentation
MATLAB provides a powerful environment for rapid prototyping of research methods and techniques. Across the wide range of on-line pen computing applications there exists a series ...
Richard M. Guest
127
Voted
MICRO
2006
IEEE
114views Hardware» more  MICRO 2006»
15 years 9 months ago
Authentication Control Point and Its Implications For Secure Processor Design
Secure processor architecture enables tamper-proof protection on software that addresses many difficult security problems such as reverse-engineering prevention, trusted computing...
Weidong Shi, Hsien-Hsin S. Lee