Sciweavers

1688 search results - page 98 / 338
» Access Control to Information in Pervasive Computing Environ...
Sort
View
150
Voted
COMCOM
2007
100views more  COMCOM 2007»
15 years 4 months ago
Using the vulnerability information of computer systems to improve the network security
In these years, the security problem becomes more important to everyone using computers. However, vulnerabilities on computers are found so frequently that system managers can not...
Yeu-Pong Lai, Po-Lun Hsia
SI3D
1999
ACM
15 years 9 months ago
UniCam - 2D gestural camera controls for 3D environments
We present a novel approach to controlling a virtual 3D camera with a 2D mouse or stylus input device that is based on gestural interaction. Our approach to 3D camera manipulation...
Robert C. Zeleznik, Andrew S. Forsberg
COMPSAC
2001
IEEE
15 years 8 months ago
Certificate Based Authorization Simulation System
Using certificates for distributed authorizations in computer network systems has been discussed in the literature. However real implementations of the concept are rarely seen. In...
Jie Dai, Jim Alves-Foss
PERVASIVE
2005
Springer
15 years 10 months ago
Simultaneous Tracking and Activity Recognition (STAR) Using Many Anonymous, Binary Sensors
Abstract. In this paper we introduce the simultaneous tracking and activity recognition (STAR) problem, which exploits the synergy between location and activity to provide the info...
D. H. Wilson, Christopher G. Atkeson
PERVASIVE
2010
Springer
15 years 6 months ago
Using Height Sensors for Biometric Identification in Multi-resident Homes
Abstract. In this study, we evaluate the use of height for biometric identification of residents, by mounting ultrasonic distance sensors above the doorways in a home. Height senso...
Vijay Srinivasan, John A. Stankovic, Kamin Whiteho...