Sciweavers

777 search results - page 90 / 156
» presence 2010
Sort
View
CAISE
2010
Springer
15 years 24 days ago
Dynamic Authorisation Policies for Event-Based Task Delegation
Task delegation presents one of the business process security leitmotifs. It defines a mechanism that bridges the gap between both workflow and access control systems. There are tw...
Khaled Gaaloul, Ehtesham Zahoor, François C...
109
Voted
PODS
2010
ACM
197views Database» more  PODS 2010»
15 years 24 days ago
When data dependencies over SQL tables meet the logics of paradox and S-3
We study functional and multivalued dependencies over SQL tables with NOT NULL constraints. Under a no-information interpretation of null values we develop tools for reasoning. We...
Sven Hartmann, Sebastian Link
113
Voted
CCS
2010
ACM
15 years 24 days ago
Input generation via decomposition and re-stitching: finding bugs in Malware
Attackers often take advantage of vulnerabilities in benign software, and the authors of benign software must search their code for bugs in hopes of finding vulnerabilities before...
Juan Caballero, Pongsin Poosankam, Stephen McCaman...
88
Voted
SIGCOMM
2010
ACM
15 years 24 days ago
How green is IP-telephony?
With constantly increasing costs of energy, we ask ourselves what we can say about the energy efficiency of existing VoIP systems. To answer that question, we gather information a...
Salman Abdul Baset, Joshua Reich, Jan Janak, Pavel...
ICASSP
2010
IEEE
15 years 24 days ago
An adaptive real-time descreening method based on SVM and improved SUSAN filter
Scanned halftone images are degraded for the presence of screen patterns. It’s a challenge to automatically detect the halftone images and remove the noises on the fly. This pap...
Xiaohua Duan, Guifeng Zheng, Hongyang Chao