Sciweavers

1795 search results - page 87 / 359
» Security Models and Information Flow
Sort
View
STACS
2005
Springer
15 years 5 months ago
Centrality Measures Based on Current Flow
Abstract. We consider variations of two well-known centrality measures, betweenness and closeness, with a different model of information spread. Rather than along shortest paths o...
Ulrik Brandes, Daniel Fleischer
BPM
2007
Springer
118views Business» more  BPM 2007»
15 years 6 months ago
Privacy Preserving Collaborative Business Process Management
The basic objective of collaborative supply chain planning (CSCP) is to fulfill the demand of the customers by integrating a network of organizations through mediums such as intern...
Sumit Chakraborty, Asim Kumar Pal
ICDIM
2007
IEEE
15 years 6 months ago
Context-aware security service in RFID/USN environments using MAUT and extended GRBAC
: This paper proposes a context-aware security service providing multiple authentications and authorization from a Security Level which is decided dynamically in a context-aware en...
Kiyeal Lee, Seokhwan Yang, Sungik Jun, Mokdong Chu...
CVPR
2001
IEEE
16 years 1 months ago
Flexible flow for 3D nonrigid tracking and shape recovery
We introduce linear methods for model-based tracking of nonrigid 3D objects and for acquiring such models from video. 3D motions and flexions are calculated directly from image in...
Matthew Brand, Rahul Bhotika
PADS
2003
ACM
15 years 5 months ago
Hybrid Packet/Fluid Flow Network Simulation
Packet-level discrete-event network simulators use an event to model the movement of each packet in the network. This results in accurate models, but requires that many events are...
Cameron Kiddle, Rob Simmonds, Carey L. Williamson,...