Sciweavers

1523 search results - page 184 / 305
» Partially ordered secretaries
Sort
View
123
Voted
ICISS
2009
Springer
14 years 10 months ago
Method-Specific Java Access Control via RMI Proxy Objects Using Annotations
We propose a novel approach for granting partial access on arbitrary objects at the granularity of methods to remote clients. The applications that we target use Remote Method Invo...
Jeff Zarnett, Patrick Lam, Mahesh V. Tripunitara
108
Voted
ENTCS
2011
125views more  ENTCS 2011»
14 years 4 months ago
A Hybrid Public Announcement Logic with Distributed Knowledge
In this paper the machinery of Hybrid Logic and the logic of public announcements are merged. In order to bring the two logics together properly the underlying hybrid logic has be...
Jens Ulrik Hansen
ICCV
2011
IEEE
14 years 26 days ago
Scale Space for Central Catadioptric Systems. Towards a generic camera feature extractor.
In this paper we propose a new approach to compute the scale space of any omnidirectional image acquired with a central catadioptric system. When these cameras are central they ar...
Luis Puig, Jose Guerrero
114
Voted
SIGMOD
2009
ACM
172views Database» more  SIGMOD 2009»
15 years 7 months ago
Self-organizing tuple reconstruction in column-stores
Column-stores gained popularity as a promising physical design alternative. Each attribute of a relation is physically stored as a separate column allowing queries to load only th...
Stratos Idreos, Martin L. Kersten, Stefan Manegold
94
Voted
FOCS
2007
IEEE
15 years 7 months ago
Covert Multi-Party Computation
In STOC’05, Ahn, Hopper and Langford introduced the notion of covert computation. A covert computation protocol is one in which parties can run a protocol without knowing if oth...
Nishanth Chandran, Vipul Goyal, Rafail Ostrovsky, ...