Sciweavers

378 search results - page 65 / 76
» Control Design and Task Performance in Endoscopic Tele-Opera...
Sort
View
CCS
2008
ACM
13 years 10 months ago
Flexible and secure enterprise rights management based on trusted virtual domains
The requirements for secure document workflows in enterprises become increasingly sophisticated, with employees performing different tasks under different roles using the same pro...
Yacine Gasmi, Ahmad-Reza Sadeghi, Patrick Stewin, ...
BMCBI
2005
160views more  BMCBI 2005»
13 years 8 months ago
Data-poor categorization and passage retrieval for Gene Ontology Annotation in Swiss-Prot
Background: In the context of the BioCreative competition, where training data were very sparse, we investigated two complementary tasks: 1) given a Swiss-Prot triplet, containing...
Frédéric Ehrler, Antoine Geissbü...
CHI
1997
ACM
14 years 27 days ago
The Rockin' Mouse: Integral 3D Manipulation on a Plane
A novel input device called the Rockin’Mouse is described and evaluated. The Rockin’Mouse is a four degree-of-freedom input device that has the same shape as a regular mouse e...
Ravin Balakrishnan, Thomas Baudel, Gordon Kurtenba...
USENIX
2004
13 years 10 months ago
Trusted Path Execution for the Linux 2.6 Kernel as a Linux Security Module
The prevention of damage caused to a system via malicious executables is a significant issue in the current state of security on Linux operating systems. Several approaches are av...
Niki A. Rahimi
ACMICEC
2008
ACM
262views ECommerce» more  ACMICEC 2008»
13 years 10 months ago
Preventing information leakage between collaborating organisations
Information sharing and protection against leakage is a critical problem especially for organisations having sensitive information. Sharing content between individuals in the same...
Muntaha Alawneh, Imad M. Abbadi