Sciweavers

4702 search results - page 125 / 941
» How to Copyright a Function
Sort
View
EUROPLOP
2006
15 years 5 months ago
Securing the Broker Pattern
We consider how to add security to the Broker distribution pattern. We do so by examining how systems using Broker are secured in practice, and by then revising the pattern to ref...
Patrick Morrison, Eduardo B. Fernandez
ICML
2005
IEEE
16 years 5 months ago
A brain computer interface with online feedback based on magnetoencephalography
The aim of this paper is to show that machine learning techniques can be used to derive a classifying function for human brain signal data measured by magnetoencephalography (MEG)...
Bernhard Schölkopf, Hubert Preißl, J&uu...
IEEEARES
2010
IEEE
15 years 11 months ago
Solving the Transitive Access Problem for the Services Oriented Architecture
: © Solving the Transitive Access Problem for the Services Oriented Architecture Alan H. Karp, Jun Li HP Laboratories HPL-2008-204R1 SOA, web services, access control, RBAC, PBAC,...
Alan H. Karp, Jun Li
ISCAS
2008
IEEE
230views Hardware» more  ISCAS 2008»
15 years 10 months ago
Joint optimization of data hiding and video compression
— From copyright protection to error concealment, video data hiding has found usage in a great number of applications. Recently proposed applications such as privacy data preserv...
Jithendra K. Paruchuri, Sen-Ching S. Cheung
116
Voted
SIGMOD
1989
ACM
118views Database» more  SIGMOD 1989»
15 years 8 months ago
The Architecture Of An Active Data Base Management System
The HiPAC project is investigating active, time-constrained databasemanagment. An active DBMS is one which automatically executes specified actions when speciifed conditions arise...
Dennis R. McCarthy, Umeshwar Dayal