Sciweavers

4511 search results - page 509 / 903
» Observation Based System Security
Sort
View
ECCV
2006
Springer
16 years 6 months ago
A Fluid Motion Estimator for Schlieren Image Velocimetry
Abstract. In this paper, we address the problem of estimating the motion of fluid flows that are visualized through a Schlieren system. Such a system is well known in fluid mechani...
Étienne Mémin, Elise Arnaud, Guiller...
PODC
1997
ACM
15 years 9 months ago
Lazy Consistency Using Loosely Synchronized Clocks
Thispaperdescribesanewschemeforguaranteeingthattransactions in a client/server system observe consistent state while they are running. The scheme is presented in conjunction with ...
Atul Adya, Barbara Liskov
165
Voted
PR
2010
220views more  PR 2010»
15 years 3 months ago
Online finger-knuckle-print verification for personal authentication
Biometric based personal authentication is an effective method for automatically recognizing, with a high confidence, a person’s identity. By observing that the texture pattern p...
Lin Zhang, Lei Zhang 0006, David Zhang, Hailong Zh...
168
Voted
SACMAT
2010
ACM
15 years 9 months ago
Role-based access control (RBAC) in Java via proxy objects using annotations
We propose a new approach for applying Role-Based Access Control (RBAC) to methods in objects in the Java programming language. In our approach, a policy implementer (usually a de...
Jeff Zarnett, Mahesh V. Tripunitara, Patrick Lam
ATC
2009
Springer
15 years 11 months ago
Management without (Detailed) Models
We present a resource management algorithm based upon guided “walks” within a system state space. Walks are guided via simple predictions of optimum behavior whose accuracy inc...
Alva L. Couch, Mark Burgess, Marc Chiarini