Sciweavers

6300 search results - page 144 / 1260
» We have it easy, but do we have it right
Sort
View
CSFW
1994
IEEE
15 years 5 months ago
One-Representative Safety Analysis in the Non-Monotonic Transform Model
We analyze the safety question for the Non-Monotonic Transform NMT model, an access control model that encompasses a wide variety of practical access control mechanisms. In genera...
Ravi S. Sandhu, Paul Ammann
CCGRID
2008
IEEE
15 years 3 months ago
Formal Verification of a Grid Resource Allocation Protocol
As the adoption of grid technology moves from science to industry, new requirements arise. In todays grid middlewares, the notion of paying for a job is a secondary requirement. In...
Mathias Dalheimer, Franz-Josef Pfreundt, Peter Mer...
CISC
2008
Springer
118views Cryptology» more  CISC 2008»
15 years 3 months ago
Inter-domain Identity-Based Proxy Re-encryption
Proxy re-encryption is a cryptographic primitive developed to delegate the decryption right from one party (the delegator) to another (the delegatee). So far, research efforts hav...
Qiang Tang, Pieter H. Hartel, Willem Jonker
APIN
2006
107views more  APIN 2006»
15 years 1 months ago
Architecture and dialogue design for a voice operated information system
Abstract In this paper we present a real automatic meteorological information system that, not only provides friendly voice access to real-time data coming from automatic sensors, ...
Luis Villarejo, Javier Hernando, Núria Cast...
IJON
2006
67views more  IJON 2006»
15 years 1 months ago
Robust persistent activity in neural fields with asymmetric connectivity
Modeling studies have shown that recurrent interactions within neural networks are capable of self-sustaining non-uniform activity profiles. These patterns are thought to be the n...
Cláudia Horta, Wolfram Erlhagen