Sciweavers

3104 search results - page 439 / 621
» Using quantitative analysis to implement autonomic IT system...
Sort
View
NTMS
2008
IEEE
15 years 11 months ago
Time and Location Based Services with Access Control
—We propose an access control model that extends RBAC (Role-Based Access Control) to take time and location into account, and use term rewriting systems to specify access control...
Clara Bertolissi, Maribel Fernández
RTCSA
2005
IEEE
15 years 10 months ago
Citron: A Context Information Acquisition Framework for Personal Devices
This paper describes a context information acquisition framework for a personal device that equips a variety of sensors. The framework captures context information about a user an...
Tetsuo Yamabe, Ayako Takagi, Tatsuo Nakajima
152
Voted
ICAPR
2005
Springer
15 years 10 months ago
Symmetric Hash Functions for Fingerprint Minutiae
Abstract. The possibility that a database with biometric data is compromised is one of the main concerns in implementing biometric identification systems. In this paper we present...
Sergey Tulyakov, Faisal Farooq, Venu Govindaraju
VMCAI
2005
Springer
15 years 10 months ago
Termination of Polynomial Programs
We present a technique to prove termination of multipath polynomial programs, an expressive class of loops that enables practical traction and analysis. The technique is based on ...
Aaron R. Bradley, Zohar Manna, Henny B. Sipma
128
Voted
HICSS
2003
IEEE
95views Biometrics» more  HICSS 2003»
15 years 10 months ago
Knowledge Negotiation in Asynchronous Learning Networks
The negotiation of what is to count as mutually acceptable collaborative knowledge is difficult to conduct when participants cannot interact face-to-face. We review certain relate...
Gerry Stahl