Sciweavers

1562 search results - page 52 / 313
» Convenience Over Correctness
Sort
View
RBAC
1998
84views more  RBAC 1998»
13 years 10 months ago
Decentralized User-role Assignment for Web-based Intranets
The intricacy of security administration is one of the most challenging problems in large networked systems. This problem is especially serious in the Web environment, which consi...
Ravi S. Sandhu, Joon S. Park
ENTCS
2006
162views more  ENTCS 2006»
13 years 9 months ago
Continuous Functions on Final Coalgebras
It can be traced back to Brouwer that continuous functions of type StrA B, where StrA is the type of infinite streams over elements of A, can be represented by well founded, Abra...
Neil Ghani, Peter Hancock, Dirk Pattinson
INFORMATICALT
2010
126views more  INFORMATICALT 2010»
13 years 6 months ago
An Entire Chaos-Based Biometric Remote User Authentication Scheme on Tokens Without Using Password
This paper presents an entire chaos-based biometric remote user authentication scheme on tokens without using passwords. The proposed scheme is based on the chaotic hash function a...
Eun-Jun Yoon, Kee-Young Yoo
TSMC
2010
13 years 3 months ago
Cyclorotation Models for Eyes and Cameras
The human visual system obeys Listing's law, which means that the cyclorotation of the eye (around the line of sight) can be predicted from the direction of the fixation point...
Miles E. Hansard, Radu Horaud
ICC
2007
IEEE
151views Communications» more  ICC 2007»
14 years 3 months ago
The Probability of Undetected Error for Varshamov-Tenengol'ts Codes
—Computation of the undetected error probability for error correcting codes over the Z-channel is an important issue, explored only in part in previous literature. In this paper ...
Franco Chiaraluce, Marco Baldi, Susanna Spinsante,...