Sciweavers

53302 search results - page 10187 / 10661
» On the design of a
Sort
View
106
Voted
USS
2008
15 years 4 months ago
NetAuth: Supporting User-Based Network Services
In User-Based Network Services (UBNS), the process servicing requests from user U runs under U's ID. This enables (operating system) access controls to tailor service authori...
Manigandan Radhakrishnan, Jon A. Solworth
USS
2008
15 years 4 months ago
Verifying Compliance of Trusted Programs
In this paper, we present an approach for verifying that trusted programs correctly enforce system security goals when deployed. A trusted program is trusted to only perform safe ...
Sandra Rueda, Dave King 0002, Trent Jaeger
95
Voted
WSC
2007
15 years 4 months ago
Using ontologies for simulation integration
This paper describes the motivations, methods, and solution concepts for the use of ontologies for simulation model integration. Ontological analysis has been shown to be an effec...
Perakath C. Benjamin, Kumar V. Akella, Ajay Verma
WSC
2007
15 years 4 months ago
Fundamentals of simulation modeling
We start with basic terminology and concepts of modeling, and decompose the art of modeling as a process. This overview of the process helps clarify when we should or should not u...
Paul J. Sánchez
98
Voted
ACMACE
2008
ACM
15 years 3 months ago
When RFIDs meet artist's painting
This work challenges the conventional art experience. It brings together the fields of art, science, and software integration. The goal was to create a new kind of painting based ...
Olivier Haberman, Romain Pellerin, Ugo Haberman
« Prev « First page 10187 / 10661 Last » Next »