Sciweavers

1587 search results - page 215 / 318
» Security Patterns and Secure Systems Design Using UML
Sort
View
CCS
2005
ACM
15 years 3 months ago
CPOL: high-performance policy evaluation
Policy enforcement is an integral part of many applications. Policies are often used to control access to sensitive information. Current policy specification languages give users ...
Kevin Borders, Xin Zhao, Atul Prakash
OOPSLA
2000
Springer
15 years 1 months ago
Application isolation in the JavaTM Virtual Machine
To date, systems offering multitasking for the JavaTM programming language either use one process or one class loader for each application. Both approaches are unsatisfactory. Usi...
Grzegorz Czajkowski
SSDBM
2003
IEEE
118views Database» more  SSDBM 2003»
15 years 3 months ago
The CenSSIS Image Database
The CenSSIS Image Database System is a scientific database that enables effective data management and collaboration to accelerate fundamental research. This paper describes the d...
Huanmei Wu, Becky Norum, Judith Newmark, Betty Sal...
ICDCSW
2007
IEEE
15 years 4 months ago
Automated Ensemble Extraction and Analysis of Acoustic Data Streams
This paper addresses the design and use of distributed pipelines for automated processing of sensor data streams. In particular, we focus on the detection and extraction of meanin...
Eric P. Kasten, Philip K. McKinley, Stuart H. Gage
WETICE
2007
IEEE
15 years 4 months ago
Enabling Collaborative eHealth through Triplespace Computing
The design and promotion of electronic patient summaries as an instrument to facilitate the pervasive delivery of healthcare is emerging as a key technology in eHealth solutions. ...
Lyndon J. B. Nixon, Dario Cerizza, Emanuele Della ...