Sciweavers

298 search results - page 49 / 60
» Computer security: quality rather than quantity
Sort
View
NORDICHI
2006
ACM
14 years 3 months ago
The FaceReader: measuring instant fun of use
Recently, more and more attention has been paid to emotions in the domain of Human-Computer Interaction. When evaluating a product, one can no longer ignore the emotions a product...
Bieke Zaman, Tara Shrimpton-Smith
ACMACE
2007
ACM
14 years 1 months ago
Tangible interfaces for real-time 3D virtual environments
Emergent game formats, such as machinima, that use game worlds as expressive 3D performance spaces have new expressive powers with an increase of the quality of their underlying g...
Ali Mazalek, Michael Nitsche
BMVC
2001
14 years 7 days ago
A Buyer's Guide to Euclidean Elliptical Cylindrical and Conical Surface Fitting
The ability to construct CAD or other object models from edge and range data has a fundamental meaning in building a recognition and positioning system. While the problem of model...
Petko Faber, Robert B. Fisher
ICTAI
2009
IEEE
14 years 4 months ago
Managing Authorization Provenance: A Modal Logic Based Approach
Abstract—In distributed environments, access control decisions depend on statements of multiple agents rather than only one central trusted party. However, existing policy langua...
Jinwei Hu, Yan Zhang, Ruixuan Li, Zhengding Lu
SP
1991
IEEE
121views Security Privacy» more  SP 1991»
14 years 1 months ago
The SRI IDES Statistical Anomaly Detector
SRI International’s real-time intrusion-detection expert system (IDES) system contains a statistical subsystem that observes behavior on a moniioreci cornpuier system and adapti...
H. S. Javitz, A. Valdes