Sciweavers

1472 search results - page 78 / 295
» Access control in virtual environments
Sort
View
148
Voted
ERCIMDL
1998
Springer
133views Education» more  ERCIMDL 1998»
15 years 8 months ago
MarketNet: Using Virtual Currency to Protect Information Systems
This paper describes novel market-based technologies for systematic, quantifiable and predictable protection of information systems against attacks. These technologies, incorporate...
Yechiam Yemini, Apostolos Dailianas, Danilo Floris...
145
Voted
GPC
2009
Springer
15 years 2 months ago
I/O Device Virtualization in the Multi-core era, a QoS Perspective
In this paper, we propose an extension to the I/O device architecture, as recommended in the PCI-SIG IOV specification, for virtualizing network I/O devices. The aim is to enable ...
J. Lakshmi, S. K. Nandy
140
Voted
HCI
2007
15 years 6 months ago
Gaze as a Supplementary Modality for Interacting with Ambient Intelligence Environments
We present our current research on the implementation of gaze as an efficient and usable pointing modality supplementary to speech, for interacting with augmented objects in our da...
Daniel Gepner, Jérôme Simonin, No&eum...
ICPADS
2008
IEEE
15 years 11 months ago
Plug: Virtual Worlds for Millions of People
We propose the design of Plug, an application to find and keep contacts with friends within many inter-connected 3D virtual worlds. Users use an instant messenger (IM)-like inter...
Shun-Yun Hu, Jehn-Ruey Jiang
132
Voted
WORDS
2005
IEEE
15 years 10 months ago
An RBAC Framework for Time Constrained Secure Interoperation in Multi-domain Environments
In emerging e-commerce applications, time constrained information sharing between different systems is becoming a common phenomenon. A flexible and efficient mechanism is needed t...
Smithi Piromruen, James B. D. Joshi