Abstract. We investigate a security framework for collaborative applications that relies on the role-based access control (RBAC) model. In our framework, roles are pre-defined and...
Isabel F. Cruz, Rigel Gjomemo, Benjamin Lin, Mirko...
Techniques to update executing programs are needed to maintain software for which downtime is not an option. Without guidelines, dynamic update may provoke unreliable and unpredic...
In many data-publishing applications, the data owner needs to protect sensitive information pertaining to individuals. Meanwhile, certain information is required to be published. T...
Abstract— An important issue in mobile commerce (mcommerce) is to exchange digital data between two distributed parties in an efficient and fair manner. In this paper, a lightwe...
We describe a technique for reconstructing probable occluded surfaces from 3-D range images. The technique exploits the fact that many objects possess shape symmetries that can be...