Sciweavers

3979 search results - page 21 / 796
» Wild control operators
Sort
View
IPAW
2010
14 years 7 months ago
Towards a Threat Model for Provenance in e-Science
Abstract. Scientists increasingly rely on workflow management systems to perform large-scale computational scientific experiments. These systems often collect provenance informatio...
Luiz M. R. Gadelha Jr., Marta Mattoso, Michael Wil...
SP
2007
IEEE
113views Security Privacy» more  SP 2007»
15 years 4 months ago
Usable Mandatory Integrity Protection for Operating Systems
Existing mandatory access control systems for operating systems are difficult to use. We identify several principles for designing usable access control systems and introduce the...
Ninghui Li, Ziqing Mao, Hong Chen
CHI
2007
ACM
15 years 10 months ago
The LiLiPUT prototype: a wearable lab environment for user tests of mobile telecommunication applications
User trials for future mobile telecommunication applications inherently pose several particular challenges which are difficult to meet in a traditional lab environment. In this pa...
Antitza Dantcheva, Lynne Baillie, Peter Fröhl...
GRID
2006
Springer
14 years 9 months ago
Exposing UDDI Service Descriptions and Their Metadata Annotations as WS-Resources
Abstract-- Service discovery is a critical task in serviceoriented architectures. GRIMOIRES is a UDDI-compliant service registry with rich metadata annotation capabilities. In this...
Weijian Fang, Luc Moreau, Rachana Ananthakrishnan,...
64
Voted
ICIP
2003
IEEE
15 years 11 months ago
Learning automatic video capture from human's camera operations
This paper presents a video acquisition system that can learn automatic video capture from human's camera operations. Unlike a predefined camera control system, this system c...
Qiong Liu, Don Kimber