Sciweavers

640 search results - page 86 / 128
» Access Control for Active Spaces
Sort
View
SMC
2007
IEEE
111views Control Systems» more  SMC 2007»
14 years 3 months ago
Towards Visual Exploration of Topic Shifts
— This paper presents two approaches to visually analyze the topic shift of a pool of documents over a given period of time. The first of the proposed methods is based on a mult...
Kilian Thiel, Fabian Dill, Tobias Kötter, Mic...
IPSN
2007
Springer
14 years 3 months ago
Harbor: software-based memory protection for sensor nodes
Many sensor nodes contain resource constrained microcontrollers where user level applications, operating system components, and device drivers share a single address space with no...
Ram Kumar, Eddie Kohler, Mani B. Srivastava
OZCHI
2006
ACM
14 years 2 months ago
Beyond security: implications for the future of federated digital identity management systems
Federated identity management is often viewed by corporations as a solution to support secure online commerce by synthesising complex and fragmented user information into a single...
Christine Satchell, Graeme G. Shanks, Steve Howard...
HPCA
2007
IEEE
14 years 3 months ago
An Adaptive Shared/Private NUCA Cache Partitioning Scheme for Chip Multiprocessors
The significant speed-gap between processor and memory and the limited chip memory bandwidth make last-level cache performance crucial for future chip multiprocessors. To use the...
Haakon Dybdahl, Per Stenström
AVBPA
2005
Springer
303views Biometrics» more  AVBPA 2005»
14 years 2 months ago
Indexing Biometric Databases Using Pyramid Technique
Abstract. Biometric identification has emerged as a reliable means of controlling access to both physical and virtual spaces. In spite of the rapid proliferation of large-scale dat...
Amit Mhatre, Sharat Chikkerur, Venu Govindaraju