Sciweavers

800 search results - page 61 / 160
» XML access control using static analysis
Sort
View
144
Voted
DBSEC
2009
110views Database» more  DBSEC 2009»
15 years 4 months ago
Distributed Privilege Enforcement in PACS
Abstract. We present a new access control mechanism for P2P networks with distributed enforcement, called P2P Access Control System (PACS). PACS enforces powerful access control mo...
Christoph Sturm, Ela Hunt, Marc H. Scholl
137
Voted
TWC
2008
99views more  TWC 2008»
15 years 3 months ago
Cross layer dynamic resource allocation with targeted throughput for WCDMA data
We consider resource allocation for elastic wireless applications that measure utility by target connection average throughput and achieved throughput. We construct a framework for...
Peifang Zhang, Scott Jordan
111
Voted
FM
2009
Springer
123views Formal Methods» more  FM 2009»
15 years 10 months ago
"Carbon Credits" for Resource-Bounded Computations Using Amortised Analysis
Abstract. Bounding resource usage is important for a number of areas, notably real-time embedded systems and safety-critical systems. In this paper, we present a fully automatic st...
Steffen Jost, Hans-Wolfgang Loidl, Kevin Hammond, ...
143
Voted
IJON
2002
120views more  IJON 2002»
15 years 3 months ago
The recognition and analysis of animate objects using neural networks and active contour models
: In this paper we describe a method for tracking walking humans in the visual field. Active contour models are used to track moving objects in a sequence of images. The resulting ...
Ken Tabb, Neil Davey, Rod Adams, Stella J. George
134
Voted
BMCBI
2006
97views more  BMCBI 2006»
15 years 3 months ago
Goulphar: rapid access and expertise for standard two-color microarray normalization methods
Background: Raw data normalization is a critical step in microarray data analysis because it directly affects data interpretation. Most of the normalization methods currently used...
Sophie Lemoine, Florence Combes, Nicolas Servant, ...