Sciweavers

304 search results - page 32 / 61
» Future Directions in Role-Based Access Control Models
Sort
View
IPPS
2000
IEEE
15 years 4 months ago
Controlling Distributed Shared Memory Consistency from High Level Programming Languages
One of the keys for the success of parallel processing is the availability of high-level programming languages for on-the-shelf parallel architectures. Using explicit message passi...
Yvon Jégou
USS
2008
15 years 2 months ago
Securing Provenance
Provenance describes how an object came to be in its present state. Intelligence dossiers, medical records and corporate financial reports capture provenance information. Many of ...
Uri Braun, Avraham Shinnar, Margo I. Seltzer
ICASSP
2009
IEEE
15 years 6 months ago
Pitch bends and tonguing articulation in clarinet physical modeling synthesis
A physical modeling approach is used to investigate playing effects in woodwind instruments. This builds upon prior work concerning both empirical studies of the acoustics of the ...
Mark Sterling, Xiaoxiao Dong, Mark Bocko
ENTCS
2007
140views more  ENTCS 2007»
14 years 11 months ago
Secured Information Flow for Asynchronous Sequential Processes
We present in this article a precise security model for data confidentiality in the framework of ASP (Asynchronous Sequential Processes). ASP is based on active objects, asynchro...
Isabelle Attali, Denis Caromel, Ludovic Henrio, Fe...
DSN
2002
IEEE
15 years 4 months ago
Process Modelling to Support Dependability Arguments
This paper reports work to support dependability arguments about the future reliability of a product before there is direct empirical evidence. We develop a method for estimating ...
Robin E. Bloomfield, Sofia Guerra