Sciweavers

1228 search results - page 235 / 246
» Manipulation of Pose Distributions
Sort
View
CCS
2004
ACM
15 years 2 months ago
Comparing the expressive power of access control models
Comparing the expressive power of access control models is recognized as a fundamental problem in computer security. Such comparisons are generally based on simulations between di...
Mahesh V. Tripunitara, Ninghui Li
SIGADA
2004
Springer
15 years 2 months ago
Enforcing security and safety models with an information flow analysis tool
Existing security models require that information of a given security level be prevented from “leaking” into lower-security information. High-security applications must be dem...
Roderick Chapman, Adrian Hilton
80
Voted
VLDB
2004
ACM
245views Database» more  VLDB 2004»
15 years 2 months ago
A Multi-Purpose Implementation of Mandatory Access Control in Relational Database Management Systems
Mandatory Access Control (MAC) implementations in Relational Database Management Systems (RDBMS) have focused solely on Multilevel Security (MLS). MLS has posed a number of challe...
Walid Rjaibi, Paul Bird
103
Voted
ECCV
2010
Springer
15 years 2 months ago
Gaussian-like Spatial Priors for Articulated Tracking
We present an analysis of the spatial covariance structure of an articulated motion prior in which joint angles have a known covariance structure. From this, a well-known, but ofte...
P2P
2003
IEEE
205views Communications» more  P2P 2003»
15 years 2 months ago
Peer-to-Peer Spatial Queries in Sensor Networks
Sensor networks, that consist of potentially several thousands of nodes each with sensing (heat, sound, light, magnetism, etc.) and wireless communication capabilities, provide gr...
Murat Demirbas, Hakan Ferhatosmanoglu