Sciweavers

1818 search results - page 214 / 364
» How users use access control
Sort
View
167
Voted
ICADL
2004
Springer
161views Education» more  ICADL 2004»
15 years 10 months ago
An Implementation of Web Image Search Engines
This paper presents our implementation techniques for an intelligent Web image search engine. A reference architecture of the system is provided and addressed in this paper. The s...
Zhiguo Gong, Leong Hou U, Chan Wa Cheang
ECRTS
1999
IEEE
15 years 9 months ago
Adding local priority-based dispatching mechanisms to P-NET networks: a fixed priority approach
In this paper we address the real-time capabilities of P-NET, which is a multi-master fieldbus standard based on a virtual token passing scheme. We show how P-NET's medium ac...
Eduardo Tovar, Francisco Vasques, Alan Burns
RSP
2003
IEEE
169views Control Systems» more  RSP 2003»
15 years 10 months ago
Rapid Prototyping and Incremental Evolution Using SLAM
The paper shows the outlines of the SLAM system and how its design is suitable for automating rapid prototyping. The system includes a very expressive object oriented specificati...
Ángel Herranz-Nieva, Juan José Moren...
ECOOP
2007
Springer
15 years 11 months ago
MAO: Ownership and Effects for More Effective Reasoning About Aspects
Abstract. Aspect-oriented advice increases the number of places one must consider during reasoning, since advice may affect all method calls and field accesses. MAO, a new variant...
Curtis Clifton, Gary T. Leavens, James Noble
CCS
2009
ACM
16 years 5 months ago
A conceptual framework for Group-Centric secure information sharing
In this paper, we propose a conceptual framework for developing a family of models for Group-Centric information sharing. The traditional approach to information sharing, characte...
Ram Krishnan, Ravi S. Sandhu, Jianwei Niu, William...