Sciweavers

13417 search results - page 2648 / 2684
» Personal information management
Sort
View
CCS
2006
ACM
15 years 3 months ago
Resiliency policies in access control
We introduce the notion of resiliency policies in the context of access control systems. Such policies require an access control system to be resilient to the absence of users. An...
Ninghui Li, Mahesh V. Tripunitara, Qihua Wang
CCS
2006
ACM
15 years 3 months ago
Safety and consistency in policy-based authorization systems
In trust negotiation and other distributed proving systems, networked entities cooperate to form proofs that are justified by collections of certified attributes. These attributes...
Adam J. Lee, Marianne Winslett
FPL
2004
Springer
164views Hardware» more  FPL 2004»
15 years 3 months ago
Dynamic Prefetching in the Virtual Memory Window of Portable Reconfigurable Coprocessors
Abstract. In Reconfigurable Systems-On-Chip (RSoCs), operating systems can primarily (1) manage the sharing of limited reconfigurable resources, and (2) support communication betwe...
Miljan Vuletic, Laura Pozzi, Paolo Ienne
EUROPAR
2006
Springer
15 years 3 months ago
Context Awareness: An Experiment with Hoarding
Abstract. Computer mobility allows people to use computers in varied and changing environments. This variability forces applications to adapt thus requiring awareness of the comput...
João Garcia, Luís Veiga, Paulo Ferre...
ICPR
2000
IEEE
15 years 3 months ago
REFLICS: Real-Time Flow Imaging and Classification System
Abstract. An accurate analysis of a large dynamic system like our oceans requires spatially fine and temporally matched data collection methods. Current methods to estimate fish st...
Sadahiro Iwamoto, Mohan M. Trivedi, David M. Check...
« Prev « First page 2648 / 2684 Last » Next »