Sciweavers

8655 search results - page 147 / 1731
» Challenges for Trusted Computing
Sort
View
HPDC
2010
IEEE
15 years 3 months ago
Mendel: efficiently verifying the lineage of data modified in multiple trust domains
Data is routinely created, disseminated, and processed in distributed systems that span multiple administrative domains. To maintain accountability while the data is transformed b...
Ashish Gehani, Minyoung Kim
100
Voted
FCCM
2003
IEEE
168views VLSI» more  FCCM 2003»
15 years 8 months ago
A Second Generation Embedded Reconfigurable Input Device for Kinetically Challenged Persons
A second generation of an embedded input device for kinetically challenged persons is presented. The new system can detect O(n2 ) free motions in space with O(n) hardware, and has...
Kyprianos Papademetriou, Apostolos Dollas, Stamati...
133
Voted
SIGUCCS
2000
ACM
15 years 7 months ago
Implementing Assistive Technology: Opportunities and Challenges
In this paper, I describe some of the challenges and opportunities presented when attempting to be proactive in improving the accessibility of the University of North Carolina at ...
Janice K. Tulloss
102
Voted
ICPR
2006
IEEE
16 years 3 months ago
CAPTCHA Challenge Tradeoffs: Familiarity of Strings versus Degradation of Images
It is a well documented fact that, for human readers, familiar text is more legible than unfamiliar text. Current-generation computer vision systems also are able to exploit some ...
Jon Louis Bentley, Sui-Yu Wang
110
Voted
ECWEB
2000
Springer
103views ECommerce» more  ECWEB 2000»
15 years 7 months ago
Security of Electronic Business Applications - Structure and Quantification
: Internet based business leads to new challenges for Information Security with trust building and partner protection as the most important issues. This article gives an overview o...
Konstantin Knorr, Susanne Röhrig