Sciweavers

12568 search results - page 2301 / 2514
» Selective user interaction
Sort
View
167
Voted
CCS
2007
ACM
15 years 8 months ago
Efficient policy analysis for administrative role based access control
Administrative RBAC (ARBAC) policies specify how Role-Based Access Control (RBAC) policies may be changed by each administrator. It is often difficult to fully understand the effe...
Scott D. Stoller, Ping Yang, C. R. Ramakrishnan, M...
CISIM
2007
IEEE
15 years 8 months ago
Semi-Automatic Segmentation of Fibrous Liver Tissue
This article presents a semi-automatic segmentation of the fibrous liver tissue in the in-vivo liver biopsy color images. The segmentation is performed using a tree-based classifi...
P. Andruszkiewicz, C. Boldak, J. Jaroszewicz
ELPUB
2007
ACM
15 years 8 months ago
Cultural Content Management at a New Level: Publishing Theater and Opera Details by Means of Open Technologies from the Web 2.0
Creating Internet services for a specific auditorium involves technical, organizational and sociological challenges to developers, processes and used technologies. Authoring and d...
Markus W. Schranz
CVPR
2009
IEEE
15 years 8 months ago
High-quality curvelet-based motion deblurring from an image pair
One promising approach to remove motion deblurring is to recover one clear image using an image pair. Existing dual-image methods require an accurate image alignment between the i...
Jian-Feng Cai, Hui Ji, Chaoqiang Liu, Zuowei Shen
SP
2010
IEEE
182views Security Privacy» more  SP 2010»
15 years 8 months ago
Object Capabilities and Isolation of Untrusted Web Applications
—A growing number of current web sites combine active content (applications) from untrusted sources, as in so-called mashups. The object-capability model provides an appealing ap...
Sergio Maffeis, John C. Mitchell, Ankur Taly
« Prev « First page 2301 / 2514 Last » Next »