Sciweavers

2477 search results - page 317 / 496
» Object list controlled process data system
Sort
View
USENIX
2007
15 years 6 months ago
From Trusted to Secure: Building and Executing Applications That Enforce System Security
Commercial operating systems have recently introduced mandatory access controls (MAC) that can be used to ensure system-wide data confidentiality and integrity. These protections...
Boniface Hicks, Sandra Rueda, Trent Jaeger, Patric...
CJ
2006
117views more  CJ 2006»
15 years 4 months ago
Atomic Hypermedia
s the development of an abstract description of what there is in the world in an application-independent form. This paper argues that attempts to support information systems intero...
Duncan Martin, Helen Ashman
DAGM
2003
Springer
15 years 9 months ago
Localization of Piled Boxes by Means of the Hough Transform
Automatic unloading of piled boxes of unknown dimensions is undoubtedly of great importance to the industry. In this contribution a system addressing this problem is described: a l...
Dimitrios Katsoulas
165
Voted
CASCON
1996
196views Education» more  CASCON 1996»
15 years 5 months ago
Monitoring overhead in distributed systems: visualization and estimation techniques
Monitoring distributed systems involves the collection, analysis, and display of interactions among managed objects. These functions are carried out by the components of a monitor...
Hasina Abdu, Hanan Lutfi Lutfiyya, Michael A. Baue...
SSD
1999
Springer
99views Database» more  SSD 1999»
15 years 8 months ago
Algorithms for Joining R-Trees and Linear Region Quadtrees
The family of R-trees is suitable for storing various kinds of multidimensional objects and is considered an excellent choice for indexing a spatial database. Region Quadtrees are ...
Antonio Corral, Michael Vassilakopoulos, Yannis Ma...