|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 266 occurrences of 200 keywords
|
|
|
Results
Found 342 publication records. Showing 340 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
202 | Myong H. Kang, Judith N. Froscher, Ira S. Moskowitz |
A framework for MLS interoperability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HASE ![In: 1st High-Assurance Systems Engineering Workshop (HASE '96), October 22, 1996, Niagara, Canada, Proceedings, pp. 198-205, 1996, IEEE Computer Society, 0-8186-7629-9. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
MLS interoperability framework, distributed object oriented computing, location independence, MLS products, rigorous evaluation/certification procedures, security critical components, MLS architectural framework, security critical components/functions, secure use, parallel programming, software reuse, component based development, legacy systems, multilevel security, architectural framework, computing paradigm |
134 | Iwen E. Kang, Thomas F. Keefe |
Concurrency control for federated multilevel secure database systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: The Eighth IEEE Computer Security Foundations Workshop (CSFW '95), March 13-15, 1995, Kenmare, County Kerry, Ireland, pp. 118-135, 1995, IEEE Computer Society, 0-8186-7033-9. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
MLS database systems, federated MLS database, local database systems, global serializability, security, interoperation, distributed databases, concurrency control, concurrency control, transaction processing, transaction processing, open systems, security of data, federated, multilevel secure database systems |
132 | Indrakshi Ray, Wei Huang |
Event Detection in Multilevel Secure Active Databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, First International Conference, ICISS 2005, Kolkata, India, December 19-21, 2005, Proceedings, pp. 177-190, 2005, Springer, 3-540-30706-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
120 | Hasan M. Jamil |
Belief Reasoning in MLS Deductive Databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMOD Conference ![In: SIGMOD 1999, Proceedings ACM SIGMOD International Conference on Management of Data, June 1-3, 1999, Philadelphia, Pennsylvania, USA., pp. 109-120, 1999, ACM Press, 1-58113-084-8. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
MLS database, beleif assertion, inheritance and overriding, reasoning, Datalog, deductive databases, CORAL |
116 | Myong H. Kang, Judith N. Froscher, Ira S. Moskowitz |
An Architecture for Multilevel Secure Interoperability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 13th Annual Computer Security Applications Conference (ACSAC 1997), 8-12 December 1997, San Diego, CA, USA, pp. 194-204, 1997, IEEE Computer Society, 0-8186-8274-4. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
multilevel secure interoperability architecture, commercial sector, cost effective high assurance multilevel security, small communities, high assurance secure solution, MLS architecture, commercial single level hardware, specialized security devices, MLS CORBA, NRL Pump, Starlight Interactive Link, MLS cooperative computing, distributed computing, standards, distributed processing, heterogeneous environments, computer systems, COTS components, security levels |
112 | Clark Weissman |
MLS-PCA: A High Assurance Security Architecture for Future Avionics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 19th Annual Computer Security Applications Conference (ACSAC 2003), 8-12 December 2003, Las Vegas, NV, USA, pp. 2-12, 2003, IEEE Computer Society, 0-7695-2041-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
105 | Myong H. Kang, Brian J. Eppinger, Judith N. Froscher |
Tools to Support Secure Enterprise Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 15th Annual Computer Security Applications Conference (ACSAC 1999), 6-10 December 1999, Scottsdale, AZ, USA, pp. 143-152, 1999, IEEE Computer Society, 0-7695-0346-2. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Security, Workflow, Tool, Enterprise computing |
92 | Iván García-Magariño, Jorge J. Gómez-Sanz, Rubén Fuentes-Fernández |
An Evaluation Framework for MAS Modeling Languages Based on Metamodel Metrics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AOSE ![In: Agent-Oriented Software Engineering IX, 9th International Workshop, AOSE 2008, Estoril, Portugal, May 12-13, 2008, Revised Selected Papers, pp. 101-115, 2008, Springer, 978-3-642-01337-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
evaluation, multi-agent system, Metric, metamodel, modeling language |
87 | Alimuddin Mohammad, Alice Chen, Guijun Wang, Changzhou Wang, Rodolfo A. Santiago |
A Multi-Layer Security Enabled Quality of Service (QoS) Management Architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EDOC ![In: 11th IEEE International Enterprise Distributed Object Computing Conference (EDOC 2007), 15-19 October 2007, Annapolis, Maryland, USA, pp. 423-434, 2007, IEEE Computer Society, 0-7695-2891-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Multi-Layer Security (MLS), Quality of Service (QoS), Service Oriented Architecture (SOA) |
86 | Navdeep Kaur, Rajwinder Singh, Manoj Misra, Anil Kumar Sarje |
Secure Transaction Management Protocols for MLS/DDBMS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, Third International Conference, ICISS 2007, Delhi, India, December 16-20, 2007, Proceedings, pp. 219-233, 2007, Springer, 978-3-540-77085-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
concurrency control, covert channel, Multilevel security, distributed database system, commit protocol |
86 | Yaron Lipman, Daniel Cohen-Or, David Levin |
Error bounds and optimal neighborhoods for MLS approximation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Symposium on Geometry Processing ![In: Proceedings of the Fourth Eurographics Symposium on Geometry Processing, Cagliari, Sardinia, Italy, June 26-28, 2006, pp. 71-80, 2006, Eurographics Association. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
86 | Nenad Jukic, Svetlozar Nestorov, Susan V. Vrbsky |
Closing the key loophole in MLS databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMOD Rec. ![In: SIGMOD Rec. 32(2), pp. 15-20, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
86 | R. E. Niemeyer |
Using Web Technologies in Two MLS Environments: A Security Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 13th Annual Computer Security Applications Conference (ACSAC 1997), 8-12 December 1997, San Diego, CA, USA, pp. 205-, 1997, IEEE Computer Society, 0-8186-8274-4. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
World Wide Web technologies, multi-level secure systems, single-level network environments, Web browser software, security sensitivity level, information transfer, security boundaries, security classification, network client, malicious code insertion, Trojan horse code, primary information flow direction, Internet, HTTP, Web server, security of data, intranet, threats, security vulnerabilities, computer viruses, database server, HyperText Transfer Protocol, denial of service attacks |
84 | Christel Calas |
GDoM: a Multilevel Document Manager. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 92, Second European Symposium on Research in Computer Security, Toulouse, France, November 23-25, 1992, Proceedings, pp. 393-408, 1992, Springer, 3-540-56246-X. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
multilevel security (mls), mls application, mls document manager, mls Unix kernel, computer security |
82 | Yow Tzu Lim, Pau-Chen Cheng, Pankaj Rohatgi, John Andrew Clark |
MLS security policy evolution with genetic programming. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GECCO ![In: Genetic and Evolutionary Computation Conference, GECCO 2008, Proceedings, Atlanta, GA, USA, July 12-16, 2008, pp. 1571-1578, 2008, ACM, 978-1-60558-130-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
policy inference, genetic programming, security policy, MLS |
82 | Thomas F. Keefe, Wei-Tek Tsai |
A multiversion transaction scheduler for centralized multilevel secure database systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HASE ![In: 1st High-Assurance Systems Engineering Workshop (HASE '96), October 22, 1996, Niagara, Canada, Proceedings, pp. 206-213, 1996, IEEE Computer Society, 0-8186-7629-9. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
multiversion transaction scheduler, centralized multilevel secure database systems, multilevel secure database management systems, MLS/DBMSs, secure multiversion scheduling protocol, serializable schedules, MLS noninterference assertions, timestamp generation, concurrency, concurrency control, transactions, correctness, contention, failure, covert channels, data access, abstract model, concurrent execution, multiple versions |
74 | Hasan M. Jamil, Gillian Dobbie |
On Logical Foundations of Multilevel Secure Databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Intell. Inf. Syst. ![In: J. Intell. Inf. Syst. 23(3), pp. 271-294, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
MLS databases, belief assertion, inheritance and overriding, security, reasoning, deductive databases, declarative language, soundness and completeness |
74 | Hasan M. Jamil, Gillian Dobbie |
A Model Theoretic Semantics for Multi-level Secure Deductive Databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICLP ![In: Logic Programming, 18th International Conference, ICLP 2002, Copenhagen, Denmark, July 29 - August 1, 2002, Proceedings, pp. 130-147, 2002, Springer, 3-540-43930-7. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
MLS databases, belief assertion, security, reasoning, deductive databases, soundness and completeness |
73 | Boniface Hicks, Sandra Julieta Rueda, Luke St. Clair, Trent Jaeger, Patrick D. McDaniel |
A logical specification and analysis for SELinux MLS policy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 12th ACM Symposium on Access Control Models and Technologies, SACMAT 2007, Sophia Antipolis, France, June 20-22, 2007, Proceedings, pp. 91-100, 2007, ACM, 978-1-59593-745-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
policy compliance, SELinux, policy analysis, multi-level security |
60 | Christian Ledergerber, Gaël Guennebaud, Miriah D. Meyer, Moritz Bächer, Hanspeter Pfister |
Volume MLS Ray Casting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Vis. Comput. Graph. ![In: IEEE Trans. Vis. Comput. Graph. 14(6), pp. 1372-1379, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
60 | Hao Wang, Carlos Eduardo Scheidegger, Cláudio T. Silva |
Optimal bandwidth selection for MLS surfaces. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Shape Modeling International ![In: 2008 International Conference on Shape Modeling and Applications (SMI 2008), June 4-6, 2008, Stony Brook, NY, USA, pp. 111-120, 2008, IEEE Computer Society, 978-1-4244-2260-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
60 | Moses Garuba, Edward Appiah, Legand L. Burge III |
Performance Study of a MLS/DBMS Implemented as a Kernelized Architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITCC (1) ![In: International Conference on Information Technology: Coding and Computing (ITCC'04), Volume 1, April 5-7, 2004, Las Vegas, Nevada, USA, pp. 566-, 2004, IEEE Computer Society, 0-7695-2108-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
53 | Mudhakar Srivatsa, Dakshi Agrawal, Steffen Reidt |
A metadata calculus for secure information sharing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009, pp. 488-499, 2009, ACM, 978-1-60558-894-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
access control, risk management, information flow |
53 | Yongzhong Xing, Xiaobei Wu, Zhiliang Xu |
Multiclass Least Squares Wavelet Support Vector Machines. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICNSC ![In: Proceedings of the IEEE International Conference on Networking, Sensing and Control, ICNSC 2008, Hainan, China, 6-8 April 2008, pp. 498-502, 2008, IEEE, 978-1-4244-1685-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
53 | Kaviraj Chopra, Sarma B. K. Vrudhula |
Efficient Symbolic Algorithms for Computing the Minimum and Bounded Leakage States. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. ![In: IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 25(12), pp. 2820-2832, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
53 | Nirmal K. Bose, Nilesh A. Ahuja |
Superresolution and noise filtering using moving least squares. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Image Process. ![In: IEEE Trans. Image Process. 15(8), pp. 2239-2248, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
53 | Inja Youn, Csilla Farkas, Bhavani Thuraisingham |
Multilevel Secure Teleconferencing over Public Switched Telephone Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DBSec ![In: Data and Applications Security XIX, 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005, Proceedings, pp. 99-113, 2005, Springer, 3-540-28138-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
53 | Sukhoon Kang, Yong-Rak Choi |
A Covert Timing Channel-Free Optimistic Concurrency Control Scheme for Multilevel Secure Database Management Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KES (3) ![In: Knowledge-Based Intelligent Information and Engineering Systems, 9th International Conference, KES 2005, Melbourne, Australia, September 14-16, 2005, Proceedings, Part III, pp. 310-316, 2005, Springer, 3-540-28896-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
53 | Walid Rjaibi |
An introduction to multilevel secure relational database management systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CASCON ![In: Proceedings of the 2004 conference of the Centre for Advanced Studies on Collaborative research, October 5-7, 2004, Markham, Ontario, Canada, pp. 232-241, 2004, IBM. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP BibTeX RDF |
|
53 | Nenad Jukic, Boris Jukic, Laurie Meamber, George S. Nezlek |
Improving E-business Customer Relationship Management Systems with Multilevel Secure Data Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 35th Hawaii International Conference on System Sciences (HICSS-35 2002), CD-ROM / Abstracts Proceedings, 7-10 January 2002, Big Island, HI, USA, pp. 174, 2002, IEEE Computer Society, 0-7695-1435-9. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
CRM Applications, Segmentation Theory, User Interface, Access Control, Knowledge Representation, E-business, Database Models |
46 | Álvaro E. Cuno Parari, Claudio Esperança, Antonio A. F. Oliveira |
Shape-sensitive MLS deformation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Vis. Comput. ![In: Vis. Comput. 25(10), pp. 911-922, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
As-rigid-as-possible deformation, Animation, Moving least squares |
46 | Zhiying He, Xiaohui Liang |
A novel simplification algorithm based on MLS and Splats for point models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CGI ![In: Proceedings of the 2009 Computer Graphics International Conference, CGI 2009, Victoria, British Columbia, Canada, May 26-29, 2009, pp. 45-52, 2009, ACM, 978-1-60558-687-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
46 | Gianmauro Cuccuru, Enrico Gobbetti, Fabio Marton, Renato Pajarola, Ruggero Pintus |
Fast low-memory streaming MLS reconstruction of point-sampled surfaces. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Graphics Interface ![In: Proceedings of the Graphics Interface 2009 Conference, May 25-27, 2009, Kelowna, British Columbia, Canada, pp. 15-22, 2009, ACM Press, 978-1-56881-470-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
46 | Yaron Lipman, Daniel Cohen-Or, David Levin |
Data-dependent MLS for faithful surface approximation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Symposium on Geometry Processing ![In: Proceedings of the Fifth Eurographics Symposium on Geometry Processing, Barcelona, Spain, July 4-6, 2007, pp. 59-67, 2007, Eurographics Association, 978-3-905673-46-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
46 | Nenad Jukic, Susan V. Vrbsky |
Asserting Beliefs in MLS Relational Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMOD Rec. ![In: SIGMOD Rec. 26(3), pp. 30-35, 1997. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
41 | Brant Hashii |
Lessons learned using alloy to formally specify MLS-PCA trusted security architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FMSE ![In: Proceedings of the 2004 ACM Workshop on Formal Methods in Security Engineering, FMSE 2004, Washington, DC, USA, October 29, 2004, pp. 86-95, 2004, ACM, 1-58113-971-3. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
multilevel security (MLS), formal specification, network security, alloy, high assurance |
40 | William Wilson, Joel Sachs, David Wichers, Peter K. Boucher |
MLS and trust issues at the user interface in MLS AISs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Sixth Annual Computer Security Applications Conference, ACSAC 1990, 3-7 December, 1990, Tucson, Arizona, USA, pp. 204-208, 1990, IEEE. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
|
39 | Mikael Onsjö, Osamu Watanabe 0001 |
Theory of Computing Systems (TOCS) Submission Version Finding Most Likely Solutions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Theory Comput. Syst. ![In: Theory Comput. Syst. 45(4), pp. 926-942, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Most-likely solution, Planted solution model, Average-case analysis, Message passing algorithm |
39 | Michel Sarkis, Christian T. Senft, Klaus Diepold |
A Novel Technique to Model the Variation of the Intrinsic Parameters of an Automatic Zoom Camera using Adaptive Delaunay Meshes Over Moving Least-Squares Surfaces. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIP (5) ![In: Proceedings of the International Conference on Image Processing, ICIP 2007, September 16-19, 2007, San Antonio, Texas, USA, pp. 425-428, 2007, IEEE, 978-1-4244-1436-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
39 | Jae Kyu Lee, Young J. Kim |
Haptic Rendering of Point Set Surfaces. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WHC ![In: Second Joint EuroHaptics Conference and Symposium on Haptic Interfaces for Virtual Environment and Teleoperator Systems, WHC 2007, Tsukuba, Japan, March 22-24, 2007, pp. 513-518, 2007, IEEE Computer Society, 978-0-7695-2738-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
39 | Osamu Watanabe 0001, Mikael Onsjö |
Finding Most Likely Solutions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CiE ![In: Computation and Logic in the Real World, Third Conference on Computability in Europe, CiE 2007, Siena, Italy, June 18-23, 2007, Proceedings, pp. 758-767, 2007, Springer, 978-3-540-73000-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
39 | Navdeep Kaur, Rajwinder Singh, Anil Kumar Sarje, Manoj Misra |
Performance Evaluation of Secure Concurrency Control Algorithm for Multilevel Secure Distributed Database Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITCC (1) ![In: International Symposium on Information Technology: Coding and Computing (ITCC 2005), Volume 1, 4-6 April 2005, Las Vegas, Nevada, USA, pp. 249-254, 2005, IEEE Computer Society, 0-7695-2315-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Distributed database, concurrency control, covert channel, multilevel secure database system |
39 | Nina Amenta, Yong Joo Kil |
Defining point-set surfaces. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Graph. ![In: ACM Trans. Graph. 23(3), pp. 264-270, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
39 | Yunheung Paek, Junsik Choi, Jinoo Joung, Junseo Lee, Seonwook Kim |
Exploiting Parallelism in Memory Operations for Code Optimization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LCPC ![In: Languages and Compilers for High Performance Computing, 17th International Workshop, LCPC 2004, West Lafayette, IN, USA, September 22-24, 2004, Revised Selected Papers, pp. 132-148, 2004, Springer, 3-540-28009-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
39 | Kaviraj Chopra, Sarma B. K. Vrudhula |
Implicit pseudo boolean enumeration algorithms for input vector control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DAC ![In: Proceedings of the 41th Design Automation Conference, DAC 2004, San Diego, CA, USA, June 7-11, 2004, pp. 767-772, 2004, ACM, 1-58113-828-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
power, CMOS, SAT, binary decision diagrams, leakage, symbolic methods |
39 | José Ramón Quevedo, Elías F. Combarro, Antonio Bahamonde |
Choosing among Algorithms to Improve Accuracy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWANN (1) ![In: Artificial Neural Nets Problem Solving Methods, 7th International Work-Conference on Artificial and Natural Neural Networks, IWANN2003, Maó, Menorca, Spain, June 3-6, 2003 Proceedings, Part I, pp. 246-253, 2003, Springer, 3-540-40210-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
39 | Myong H. Kang, Judith N. Froscher, Amit P. Sheth, Krys J. Kochut, John A. Miller 0001 |
A Multilevel Secure Workflow Management System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CAiSE ![In: Advanced Information Systems Engineering, 11th International Conference CAiSE'99, Heidelberg, Germany, June 14-18, 1999, Proceedings, pp. 271-285, 1999, Springer, 3-540-66157-3. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
39 | Rae K. Burns, Yi-Fang Koh |
A Comparison of Multilevel Structured Query Language (SQL) Implementations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 12th Annual Computer Security Applications Conference (ACSAC 1996), 9-13 December 1996, San Diego, CA, USA, pp. 192-202, 1996, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
|
39 | Daniela Ponce, Martina Husáková, Tomás Nacházel, Vladimír Bures, Pavel Cech, Peter Mikulecký, Kamila Stekerová, Petr Tucník, Marek Zanker, Karel Mls, Ioanna Triantafyllou, Frantisek Babic |
Unification of tsunami-related terminology: Ontology engineering perspective. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Geosci. ![In: Comput. Geosci. 178, pp. 105404, September 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
39 | Pavel Cech, Daniela Ponce, Peter Mikulecký, Karel Mls, Andrea Zvácková, Petr Tucník, Tereza Otcenásková |
Generating Synthetic Data to Improve Intrusion Detection in Smart City Network Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MSPN ![In: Mobile, Secure, and Programmable Networking - 9th International Conference, MSPN 2023, Paris, France, October 26-27, 2023, Revised Selected Papers, pp. 40-51, 2023, Springer, 978-3-031-52425-7. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
39 | Frantisek Babic, Vladimír Bures, Pavel Cech, Martina Husáková, Peter Mikulecký, Karel Mls, Tomás Nacházel, Daniela Ponce, Kamila Stekerová, Ioanna Triantafyllou, Petr Tucník, Marek Zanker |
Review of Tools for Semantics Extraction: Application in Tsunami Research Domain. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. ![In: Inf. 13(1), pp. 4, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
39 | Michal Dobrovolny, Karel Mls, Ondrej Krejcar, Sebastien Mambou, Ali Selamat |
Medical Image Data Upscaling with Generative Adversarial Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWBBIO ![In: Bioinformatics and Biomedical Engineering - 8th International Work-Conference, IWBBIO 2020, Granada, Spain, May 6-8, 2020, Proceedings, pp. 739-749, 2020, Springer, 978-3-030-45384-8. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
39 | Karel Mls, Richard Cimler, Ján Vascák, Michal Puheim |
Interactive evolutionary optimization of fuzzy cognitive maps. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Neurocomputing ![In: Neurocomputing 232, pp. 58-68, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
39 | Vladimír Bures, Petr Tucník, Peter Mikulecký, Karel Mls, Petr Blecha |
Application of Ambient Intelligence in Educational Institutions: Visions and Architectures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Ambient Comput. Intell. ![In: Int. J. Ambient Comput. Intell. 7(1), pp. 94-120, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
39 | Richard Cimler, Martin Gavalec, Karel Mls, Daniela Ponce |
Decision Support Biomedical Application Based on Consistent Optimization of Preference Matrices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCCI (2) ![In: Computational Collective Intelligence - 8th International Conference, ICCCI 2016, Halkidiki, Greece, September 28-30, 2016, Proceedings, Part II, pp. 292-302, 2016, Springer, 978-3-319-45245-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
39 | Richard Cimler, Karel Mls, Martin Gavalec |
Decision Support Smartphone Application Based on Interval AHP Method. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCCI (2) ![In: Computational Collective Intelligence - 7th International Conference, ICCCI 2015, Madrid, Spain, September 21-23, 2015, Proceedings, Part II, pp. 306-315, 2015, Springer, 978-3-319-24305-4. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
39 | Martin Gavalec, Karel Mls, Hana Tomásková |
Optimization of the ordinal and cardinal consistency of a preference matrix in decision making. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IFSA-EUSFLAT ![In: 2015 Conference of the International Fuzzy Systems Association and the European Society for Fuzzy Logic and Technology (IFSA-EUSFLAT-15), Gijón, Spain., June 30, 2015., 2015, Atlantis Press, 978-94-62520-77-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
39 | Karel Mls, Tereza Otcenásková |
Analysis of Complex Decisional Situations in Companies with the Support of AHP Extension of Vroom-Yetton Contingency Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MIM ![In: 7th IFAC Conference on Manufacturing Modelling, Management, and Control, MIM 2013, Saint Petersburg, Russia, June 19-21, 2013., pp. 549-554, 2013, International Federation of Automatic Control, 978-3-902823-35-9. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
39 | Richard Cimler, Karel Mls |
Intelligent House - Smart Living and Smart Workplace in Practical Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Intelligent Environments (Workshops) ![In: Workshop Proceedings of the 9th International Conference on Intelligent Environments, Athens, Greece, July 16-17, 2013, pp. 338-346, 2013, IOS Press, 978-1-61499-285-1. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
39 | Karel Mls, Jose L. Salmeron, Kamila Olsevicova, Martina Husáková |
Cognitive Personal Software Assistants within AmI Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AMIF ![In: Ambient Intelligence Perspectives II - Selected Papers from the Second International Ambient Intelligence Forum 2009, Hradec Králové, Czech Republic, 16-17 September 2009, pp. 167-174, 2009, IOS Press, 978-1-60750-481-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
39 | Yvonne D. Gray, Elizabeth D. Liddy, Dale Sanders, Henry Small, Mls Ahip Kathy Moeller |
DataMining for healthcare professionals. Sponsored by SIG MED. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIST ![In: Information, Connetcitons and Community - Proceedings of the 65th ASIS&T Annual Meeting, ASIST 2002, Philadelphia, PA, USA, November 18-21, 2002, pp. 464, 2002, Wiley. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
35 | Samiha Ayed, Nora Cuppens-Boulahia, Frédéric Cuppens |
An Integrated Model for Access Control and Information Flow Requirements. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIAN ![In: Advances in Computer Science - ASIAN 2007. Computer and Network Security, 12th Asian Computing Science Conference, Doha, Qatar, December 9-11, 2007, Proceedings, pp. 111-125, 2007, Springer, 978-3-540-76927-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
DTE, RBAC, Security Policy, MLS, OrBAC |
35 | Richard E. Smith |
Mandatory Protection for Internet Server Software. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 12th Annual Computer Security Applications Conference (ACSAC 1996), 9-13 December 1996, San Diego, CA, USA, pp. 178-184, 1996, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
multilevel security applications, Internet server software, server overrun, attack code, server host, mandatory protection mechanisms, commercial systems, Unix chroot isolation, type enforcement, server protection, Internet, MLS, security flaws |
33 | Jingyi Jin, Michael Garland, Edgar A. Ramos |
MLS-based scalar fields over triangle meshes and their application in mesh processing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SI3D ![In: Proceedings of the 2009 Symposium on Interactive 3D Graphics, SI3D 2009, February 27 - March 1, 2009, Boston, Massachusetts, USA, pp. 145-153, 2009, ACM, 978-1-60558-429-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
geodesic path, scalar field design, mesh processing, scattered data interpolation, moving least squares |
33 | Heping Yan, Bing Liu 0009, Xiaoming Yang, Wei Wang 0009, Baile Shi, Genxing Yang |
Controlling FD and MVD Inferences in MLS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIT ![In: Fifth International Conference on Computer and Information Technology (CIT 2005), 21-23 September 2005, Shanghai, China, pp. 82-87, 2005, IEEE Computer Society, 0-7695-2432-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
33 | Young-Hwan Oh, Hae-Young Bae |
MLS/SDM: Multi-level Secure Spatial Data Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (1) ![In: Computational Science and Its Applications - ICCSA 2004, International Conference, Assisi, Italy, May 14-17, 2004, Proceedings, Part I, pp. 222-229, 2004, Springer, 3-540-22054-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
33 | Vlad Ingar Wietrzyk, Makoto Takizawa 0001, Vijay Varadharajan |
A Strategy for MLS Workflow. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 6th Australasian Conference, ACISP 2001, Sydney, Australia, July 11-13, 2001, Proceedings, pp. 159-175, 2001, Springer, 3-540-42300-1. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
26 | Hao Wang, Carlos Eduardo Scheidegger, Cláudio T. Silva |
Bandwidth Selection and Reconstruction Quality in Point-Based Surfaces. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Vis. Comput. Graph. ![In: IEEE Trans. Vis. Comput. Graph. 15(4), pp. 572-582, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
26 | Robert Berke, Mikael Onsjö |
Propagation Connectivity of Random Hypergraphs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAGA ![In: Stochastic Algorithms: Foundations and Applications, 5th International Symposium, SAGA 2009, Sapporo, Japan, October 26-28, 2009. Proceedings, pp. 117-126, 2009, Springer, 978-3-642-04943-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
26 | Torben Amtoft, John Hatcliff, Edwin Rodríguez, Robby, Jonathan Hoag, David A. Greve |
Specification and Checking of Software Contracts for Conditional Information Flow. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FM ![In: FM 2008: Formal Methods, 15th International Symposium on Formal Methods, Turku, Finland, May 26-30, 2008, Proceedings, pp. 229-245, 2008, Springer, 978-3-540-68235-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Nicholas Bonello, Sheng Chen 0001, Lajos Hanzo |
Multilevel Structured Low-Density Parity-Check Codes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICC ![In: Proceedings of IEEE International Conference on Communications, ICC 2008, Beijing, China, 19-23 May 2008, pp. 485-489, 2008, IEEE. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
26 | André Schumacher, Pekka Orponen, Thorn Thaler, Harri Haanpää |
Lifetime Maximization in Wireless Sensor Networks by Distributed Binary Search. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EWSN ![In: Wireless Sensor Networks, 5th European Conference, EWSN 2008, Bologna, Italy, January 30-February 1, 2008, Proceedings, pp. 237-252, 2008, Springer, 978-3-540-77689-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Michal Morawski |
Network based controller applied to a highly dynamic system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ETFA ![In: Proceedings of 13th IEEE International Conference on Emerging Technologies and Factory Automation, ETFA 2008, September 15-18, 2008, Hamburg, Germany, pp. 1302-1309, 2008, IEEE, 1-4244-1505-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Iván García-Magariño |
Towards the Coexistence of Different Multi-Agent System Modeling Languages with a Powertype-Based Metamodel. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DCAI ![In: International Symposium on Distributed Computing and Artificial Intelligence, DCAI 2008, University of Salamanca, Spain, 22th-24th October 2008, pp. 189-193, 2008, Springer, 978-3-540-85862-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
powertype, software engineering, multi-agent systems, model-driven development, metamodel |
26 | Gaël Guennebaud, Markus H. Gross |
Algebraic point set surfaces. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Graph. ![In: ACM Trans. Graph. 26(3), pp. 23, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
moving least square surfaces, surface representation, point based graphics, sharp features |
26 | Noriko Takemura, Jun Miura |
View Planning of Multiple Active Cameras for Wide Area Surveillance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICRA ![In: 2007 IEEE International Conference on Robotics and Automation, ICRA 2007, 10-14 April 2007, Roma, Italy, pp. 3173-3179, 2007, IEEE. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Bo-Chieh Liu, Ken-Huang Lin |
Error Analysis of the Distance and Distance Difference for SSSD-based Wireless Location: Part II-Experimental Results. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VTC Spring ![In: Proceedings of the 65th IEEE Vehicular Technology Conference, VTC Spring 2007, 22-25 April 2007, Dublin, Ireland, pp. 689-693, 2007, IEEE. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Bo-Chieh Liu, Ken-Huang Lin |
Error Analysis of the Distance and Distance Difference for SSSD-based Wireless Location: Part I-Theoretical Aspects. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VTC Spring ![In: Proceedings of the 65th IEEE Vehicular Technology Conference, VTC Spring 2007, 22-25 April 2007, Dublin, Ireland, pp. 684-688, 2007, IEEE. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Harri Haanpää, André Schumacher, Thorn Thaler, Pekka Orponen |
Distributed Computation of Maximum Lifetime Spanning Subgraphs in Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MSN ![In: Mobile Ad-Hoc and Sensor Networks, Third International Conference, MSN 2007, Beijing, China, December 12-14, 2007, Proceedings, pp. 445-456, 2007, Springer, 978-3-540-77023-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Lei Xia, Wei Huang, Hao Huang |
A Compositional Multiple Policies Operating System Security Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISA ![In: Information Security Applications, 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers, pp. 291-302, 2007, Springer, 978-3-540-77534-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
multiple policy views, integrity assurance, confidentiality assurance, security model, separation of duties, least privilege |
26 | Pau-Chen Cheng, Pankaj Rohatgi, Claudia Keser, Paul A. Karger, Grant M. Wagner, Angela Schuett Reninger |
Fuzzy Multi-Level Security: An Experiment on Quantified Risk-Adaptive Access Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 2007 IEEE Symposium on Security and Privacy (S&P 2007), 20-23 May 2007, Oakland, California, USA, pp. 222-230, 2007, IEEE Computer Society, 0-7695-2848-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Sumesh J. Philip |
On the scalability of multicast location service in mobile ad hoc networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BROADNETS ![In: Fourth International Conference on Broadband Communications, Networks and Systems, (BROADNETS 2007), 10-14 September 2007, Raleigh, North-Carolina, USA, pp. 698-705, 2007, IEEE, 978-1-4244-1432-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Bader Ali, Wilfred Villegas, Muthucumaru Maheswaran |
A trust based approach for protecting user data in social networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CASCON ![In: Proceedings of the 2007 conference of the Centre for Advanced Studies on Collaborative Research, October 22-25, 2007, Richmond Hill, Ontario, Canada, pp. 288-293, 2007, IBM. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Achraf Dhayni, Salvador Mir, Libor Rufer, Ahcène Bounceur |
Pseudorandom functional BIST for linear and nonlinear MEMS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DATE ![In: Proceedings of the Conference on Design, Automation and Test in Europe, DATE 2006, Munich, Germany, March 6-10, 2006, pp. 664-669, 2006, European Design and Automation Association, Leuven, Belgium, 3-9810801-1-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Sun-Jeong Kim, Chang Geun Song |
Rendering of Unorganized Points with Octagonal Splats. ![Search on Bibsonomy](Pics/bibsonomy.png) |
International Conference on Computational Science (2) ![In: Computational Science - ICCS 2006, 6th International Conference, Reading, UK, May 28-31, 2006, Proceedings, Part II, pp. 326-333, 2006, Springer, 3-540-34381-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Libor Rufer, Salvador Mir, Emmanuel Simeu, C. Domingues |
On-Chip Pseudorandom MEMS Testing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Electron. Test. ![In: J. Electron. Test. 21(3), pp. 233-241, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
BIST, pseudorandom sequences, impulse response, MEMS testing |
26 | Anne Berry, Richard Krueger, Geneviève Simonet |
Ultimate Generalizations of LexBFS and LEX M. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WG ![In: Graph-Theoretic Concepts in Computer Science, 31st International Workshop, WG 2005, Metz, France, June 23-25, 2005, Revised Selected Papers, pp. 199-213, 2005, Springer, 3-540-31000-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Soon-Jeong Ahn, Jaechil Yoo, Byung-Gook Lee, Joon-Jae Lee |
3D Surface Reconstruction from Scattered Data Using Moving Least Square Method. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIAP ![In: Image Analysis and Processing - ICIAP 2005, 13th International Conference, Cagliari, Italy, September 6-8, 2005, Proceedings, pp. 719-726, 2005, Springer, 3-540-28869-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Conrad Sanderson, Samy Bengio |
Statistical transformations of frontal models for non-frontal face verification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIP ![In: Proceedings of the 2004 International Conference on Image Processing, ICIP 2004, Singapore, October 24-27, 2004, pp. 585-588, 2004, IEEE, 0-7803-8554-3. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
26 | Huafeng Liu 0003, Pengcheng Shi |
Discontinuity-Preserving Moving Least Squares Method. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: Computational and Information Science, First International Symposium, CIS 2004, Shanghai, China, December 16-18, 2004, Proceedings, pp. 562-569, 2004, Springer, 3-540-24127-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
26 | Indrakshi Ray |
Multilevel Secure Rules and Its Impact on the Design of Active Database Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BNCOD ![In: New Horizons in Information Management, 20th British National Conference on Databases, BNCOD 20, Coventry, UK, July 15-17, 2003, Proceedings, pp. 226-244, 2003, Springer, 3-540-40536-4. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
26 | Elisa Bertino, Barbara Catania, Elena Ferrari |
A nested transaction model for multilevel secure database management systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 4(4), pp. 321-370, 2001. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
multilevel secure database management systems, concurrency control, covert channels, Nested transactions |
26 | Kirsi Virrantaus, Jouni Markkula, Artem Garmash, Vagan Y. Terziyan, Jari Veijalainen, Artem Katasonov, Henry Tirri |
Developing GIS-Supported Location-Based Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISE (2) ![In: Proceedings of the 2nd International Conference on Web Information Systems Engineering, WISE'01, Organized by WISE Society and Kyoto University, Kyoto, Japan, 3-6 December 2001, Volume 2 (Workshops), pp. 66-75, 2001, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
XML, GIS, Location-Based Services, Mobile Internet |
26 | Asa Elkins, Jeffery W. Wilson, Denis Gracanin |
Security issues in high level architecture based distributed simulation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WSC ![In: Proceedings of the 33nd conference on Winter simulation, WSC 2001, Arlington, VA, USA, December 9-12, 2001, pp. 818-826, 2001, WSC, 0-7803-7309-X. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
26 | John McHugh |
An Information Flow Tool for Gypsy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 17th Annual Computer Security Applications Conference (ACSAC 2001), 11-14 December 2001, New Orleans, Louisiana, USA, pp. 191-201, 2001, IEEE Computer Society, 0-7695-1405-7. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
26 | Myong H. Kang, Ira S. Moskowitz, Daniel C. Lee 0001 |
A Network Pump. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Software Eng. ![In: IEEE Trans. Software Eng. 22(5), pp. 329-338, 1996. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
security, information theory, flow control, router, Covert channel, gateway |
26 | Todd Fine |
Defining Noninterference in the Temporal Logic of Actions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 1996 IEEE Symposium on Security and Privacy, May 6-8, 1996, Oakland, CA, USA, pp. 12-21, 1996, IEEE Computer Society, 0-8186-7417-2. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
noninterference properties, temporal logic of actions, multilevel secure systems, formal specification, formal methods, temporal logic, composition, security of data, covert channels, definitions, specification refinement |
26 | Xiaolei Qian |
View-Based Access Control with High Assurance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 1996 IEEE Symposium on Security and Privacy, May 6-8, 1996, Oakland, CA, USA, pp. 85-93, 1996, IEEE Computer Society, 0-8186-7417-2. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
|
26 | Yonglak Sohn, Songchun Moon |
Tightly Secure Transaction Scheduler in Multi-Level Secure Database Management Systems ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEXA ![In: Database and Expert Systems Applications, 6th International Conference, DEXA'95, London, United Kingdom, September 4-8, 1995, Proceedings, pp. 512-521, 1995, Springer, 3-540-60303-4. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
|
26 | Iwen E. Kang, Thomas F. Keefe |
On Transaction Processing for Multilevel Secure Replicated Databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 92, Second European Symposium on Research in Computer Security, Toulouse, France, November 23-25, 1992, Proceedings, pp. 329-348, 1992, Springer, 3-540-56246-X. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
Global Transaction Manager, Transaction Processing, Multilevel Secure, Replicated Database |
Displaying result #1 - #100 of 340 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ >>] |
|