Sciweavers

1688 search results - page 81 / 338
» Access Control to Information in Pervasive Computing Environ...
Sort
View
SACMAT
2006
ACM
15 years 10 months ago
Access control, confidentiality and privacy for video surveillance databases
In this paper we have addressed confidentiality and privacy for video surveillance databases. First we discussed our overall approach for suspicious event detection. Next we discu...
Bhavani M. Thuraisingham, Gal Lavee, Elisa Bertino...
NIPS
1993
15 years 5 months ago
Computational Elements of the Adaptive Controller of the Human Arm
We consider the problem of how the CNS learns to control dynamics of a mechanical system. By using a paradigm where a subject's hand interacts with a virtual mechanical envir...
Reza Shadmehr, Ferdinando A. Mussa-Ivaldi
ISMB
1993
15 years 5 months ago
A Service-Oriented Information Sources Database for the Biological Sciences
Researchersin the biological sciencesrequire access to a variety of information sources locatedin variousplacesondifferent computer networks.In order to satisfy the information ne...
Gordon K. Springer, Timothy B. Patrick
SAC
2000
ACM
15 years 8 months ago
The Mobile Agent Technology to Support and to Access Museum Information
The global scenario put together by communication networks determines new opportunities towards the realization of Internetbased distributed services in many complex and composite...
Paolo Bellavista, Antonio Corradi, Andrea Tomasi
SACMAT
2010
ACM
15 years 9 months ago
Role updating for assignments
The role-based access control (RBAC) has significantly simplified the management of users and permissions in computing systems. In dynamic environments, systems are usually unde...
Jinwei Hu, Yan Zhang, Ruixuan Li, Zhengding Lu