Sciweavers

800 search results - page 123 / 160
» XML access control using static analysis
Sort
View
220
Voted
ESOP
2004
Springer
15 years 8 months ago
Trust Management in Strand Spaces: A Rely-Guarantee Method
We show how to combine trust management theories with nonce-based cryptographic protocols. The strand space framework for protocol analysis is extended by associating formulas from...
Joshua D. Guttman, F. Javier Thayer, Jay A. Carlso...
213
Voted
ICRA
2007
IEEE
105views Robotics» more  ICRA 2007»
15 years 9 months ago
A Submerged Freeze Microgripper for Micromanipulations
— Efficient, reliable and flexible handling is still very challenging in micromanipulation and micro-assembly. In this paper, we propose an original thermally actuated gripper b...
Beatriz Lopez Walle, Michaël Gauthier, Nicola...
106
Voted
TSMC
2010
14 years 10 months ago
Toward Unconstrained Ear Recognition From Two-Dimensional Images
Abstract--Ear recognition, as a biometric, has several advantages. In particular, ears can be measured remotely and are also relatively static in size and structure for each indivi...
John D. Bustard, Mark S. Nixon
SIGMETRICS
1996
ACM
122views Hardware» more  SIGMETRICS 1996»
15 years 7 months ago
Experiments with Digital Video Playback
In this paper we describe our experiments on digital video applications, concentrating on the static and dynamic tradeo s involved in video playback. Our results were extracted fr...
Richard Gerber, Ladan Gharai
DELOS
2004
15 years 4 months ago
Peer-to-Peer Overlays and Data Integration in a Life Science Grid
Databases and Grid computing are a good match. With the service orientation of Grid computing, the complexity of maintaining and integrating databases can be kept away from the act...
Curt Cramer, Andrea Schafferhans, Thomas Fuhrmann