Sciweavers

2477 search results - page 171 / 496
» Object list controlled process data system
Sort
View
IFIP
2005
Springer
15 years 8 months ago
Type-Based Distributed Access Control vs. Untyped Attackers
This paper considers the effect of untyped attackers inside a distributed system where security is enforced by the type system. In previous work we introduced the Key-Based Decentr...
Tom Chothia, Dominic Duggan
CIKM
2008
Springer
15 years 5 months ago
Scaling up duplicate detection in graph data
Duplicate detection determines different representations of realworld objects in a database. Recent research has considered the use of relationships among object representations t...
Melanie Herschel, Felix Naumann
CSL
2007
Springer
15 years 3 months ago
On noise masking for automatic missing data speech recognition: A survey and discussion
Automatic speech recognition (ASR) has reached very high levels of performance in controlled situations. However, the performance degrades significantly when environmental noise ...
Christophe Cerisara, Sébastien Demange, Jea...
SACMAT
2006
ACM
15 years 9 months ago
Secure resource description framework: an access control model
In this paper we propose an access control model for the Resource Description Framework (RDF). We argue that existing access control models, like the ones developed for securing e...
Amit Jain, Csilla Farkas
CDC
2008
IEEE
163views Control Systems» more  CDC 2008»
15 years 9 months ago
A cooperative deployment strategy for optimal sampling in spatiotemporal estimation
— This paper considers a network composed of robotic agents and static nodes performing spatial estimation of a dynamic physical processes. The physical process is modeled as a s...
Rishi Graham, Jorge Cortés