Sciweavers

4445 search results - page 775 / 889
» Reflective Authorization Systems
Sort
View
IV
2006
IEEE
113views Visualization» more  IV 2006»
15 years 4 months ago
Output Media Adapted Cartographic Visualisation
In modern cartography of the late twentieth century, the Internet offers an ideal platform for the communication via maps. The map graphics pose as an essential part of the graphi...
Alexandra Stadler, Mirjanka Lechthaler
ACSAC
2005
IEEE
15 years 3 months ago
Multi-Level Security Requirements for Hypervisors
Using hypervisors or virtual machine monitors for security has become very popular in recent years, and a number of proposals have been made for supporting multi-level security on...
Paul A. Karger
CODES
2005
IEEE
15 years 3 months ago
Comparing two testbench methods for hierarchical functional verification of a bluetooth baseband adaptor
The continuous improvement on the design methodologies and processes has made possible the creation of huge and very complex digital systems. Design verification is one of the mai...
Edgar L. Romero, Marius Strum, Wang Jiang Chau
NDSS
2005
IEEE
15 years 3 months ago
One-Way Isolation: An Effective Approach for Realizing Safe Execution Environments
In this paper, we present an approach for realizing a safe execution environment (SEE) that enables users to “try out” new software (or configuration changes to existing soft...
Weiqing Sun, Zhenkai Liang, V. N. Venkatakrishnan,...
BIRTHDAY
2005
Springer
15 years 3 months ago
Planning in Answer Set Programming using Ordered Task Decomposition
abstract. In this paper we investigate a formalism for solving planning problems based on ordered task decomposition using Answer Set Programming (ASP). Our planning methodology is...
Jürgen Dix, Ugur Kuter, Dana S. Nau