Sciweavers

195 search results - page 32 / 39
» How Role Based Access Control is Implemented in SESAME
Sort
View
72
Voted
ICDCS
2010
IEEE
15 years 1 months ago
ESCUDO: A Fine-Grained Protection Model for Web Browsers
Web applications are no longer simple hyperlinked documents. They have progressively evolved to become highly complex—web pages combine content from several sources (with varyin...
Karthick Jayaraman, Wenliang Du, Balamurugan Rajag...
DAIS
2003
14 years 11 months ago
Middleware Support for Resource-Constrained Software Deployment
Abstract The JAMUS platform is dedicated to providing a safe runtime environment for untrusted Java application programs, while offering each of these programs access to the resour...
Nicolas Le Sommer, Frédéric Guidec
IROS
2006
IEEE
127views Robotics» more  IROS 2006»
15 years 3 months ago
Learning Predictive Features in Affordance based Robotic Perception Systems
This work is about the relevance of Gibson’s concept of affordances [1] for visual perception in interactive and autonomous robotic systems. In extension to existing functional ...
Gerald Fritz, Lucas Paletta, Ralph Breithaupt, Eri...
ECRTS
1999
IEEE
15 years 1 months ago
Adding local priority-based dispatching mechanisms to P-NET networks: a fixed priority approach
In this paper we address the real-time capabilities of P-NET, which is a multi-master fieldbus standard based on a virtual token passing scheme. We show how P-NET's medium ac...
Eduardo Tovar, Francisco Vasques, Alan Burns
JECR
2002
120views more  JECR 2002»
14 years 9 months ago
Strategic Connectivity in Extended Enterprise Networks
Extended enterprises are networks of organizations interconnected to exchange critical resources, such as raw materials, labor, access to markets, specialized skills and knowledge...
John Tillquist