Sciweavers

838 search results - page 120 / 168
» autonomics 2007
Sort
View
DBSEC
2006
124views Database» more  DBSEC 2006»
15 years 1 months ago
Consolidating the Access Control of Composite Applications and Workflows
The need for enterprise application integration projects leads to complex composite applications. For the sake of security and efficiency, consolidated access control policies for ...
Martin Wimmer, Alfons Kemper, Maarten Rits, Volkma...
BDA
2001
15 years 1 months ago
Self-coordinated and self-traced dynamic composite services
The growth of Internet technologies has unleashed a wave of innovations that are having tremendous impact on the way organisations interact with their partners and customers. It h...
Marie-Christine Fauvet, Boualem Benatallah, Marlon...
BDA
2003
15 years 1 months ago
Memory Requirements for Query Execution in Highly Constrained Devices
Pervasive computing introduces data management requirements that must be tackled in a growingvariety of lightweight computing devices. Personal folders on chip, networks of sensor...
Nicolas Anciaux, Luc Bouganim, Philippe Pucheral
DAGSTUHL
2003
15 years 1 months ago
Toward a Cognitive System Algebra: Application to Facial Expression Learning and Imitation
In this paper, we try to demonstrate the capability of a very simple architecture to learn to recognize and reproduce facial expressions without the innate capability to recognize ...
Philippe Gaussier, Ken Prepin, Jacqueline Nadel
DBSEC
2003
113views Database» more  DBSEC 2003»
15 years 1 months ago
ECPV: Efficient Certificate Path Validation in Public-key Infrastructure
In the current public-key infrastructure (PKI) schemes based on X.509, a relying party must validate a user’s certificate as well as the existence of a path from its trust point...
Mahantesh Halappanavar, Ravi Mukkamala