Sciweavers

2429 search results - page 227 / 486
» Using Aspects to Design a Secure System
Sort
View
123
Voted
ACSAC
2001
IEEE
15 years 7 months ago
Determining Privileges of Mobile Agents
This paper describes a method for controlling the behavior of mobile agent-system entities through the allocation of privileges. Privileges refer to policy rules that govern the a...
Wayne A. Jansen
COLING
1992
15 years 4 months ago
A Case Study of Natural Language Customisation: The Practical Effects of World Knowledge
This paper proposes a methodology for the eustomisation of natural language interfaces to information retrieval applications. We report a field study in which we tested this metho...
Marilyn A. Walker, Andrew L. Nelson, Phil Stenton
TIFS
2010
173views more  TIFS 2010»
15 years 1 months ago
A hybrid approach for generating secure and discriminating face template
Abstract—Biometric template protection is one of the most important issues in deploying a practical biometric system. To tackle this problem, many algorithms, that do not store t...
Yi C. Feng, Pong C. Yuen, Anil K. Jain
123
Voted
OOPSLA
2010
Springer
15 years 2 months ago
Concurrency by modularity: design patterns, a case in point
General purpose object-oriented programs typically aren’t embarrassingly parallel. For these applications, finding enough concurrency remains a challenge in program design. To ...
Hridesh Rajan, Steven M. Kautz, Wayne Rowcliffe
165
Voted
ASPLOS
2008
ACM
15 years 5 months ago
Overshadow: a virtualization-based approach to retrofitting protection in commodity operating systems
Commodity operating systems entrusted with securing sensitive data are remarkably large and complex, and consequently, frequently prone to compromise. To address this limitation, ...
Xiaoxin Chen, Tal Garfinkel, E. Christopher Lewis,...