Sciweavers

804 search results - page 48 / 161
» How to Break Access Control in a Controlled Manner
Sort
View
CHI
2010
ACM
15 years 11 months ago
Rethinking RFID: awareness and control for interaction with RFID systems
People now routinely carry radio frequency identification (RFID) tags – in passports, driver’s licenses, credit cards, and other identifying cards – where nearby RFID reader...
Nicolai Marquardt, Alex S. Taylor, Nicolas Villar,...
SDMW
2004
Springer
15 years 9 months ago
Identifying Sensitive Associations in Databases for Release Control
In a database system, authorization-based access-control is generally the first line of defense, preventing unauthorized accesses to secret or sensitive data. However, this mechan...
Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodi...
INFOCOM
2005
IEEE
15 years 10 months ago
Designing wireless radio access networks for third generation cellular networks
— In third generation (3G) cellular networks, base stations are connected to base station controllers by pointto-point (usually T1/E1) links. However, today’s T1/E1 based backh...
Tian Bu, Mun Choon Chan, Ramachandran Ramjee
TOG
2002
162views more  TOG 2002»
15 years 4 months ago
Animation and rendering of complex water surfaces
We present a new method for the animation and rendering of photorealistic water effects. Our method is designed to produce visually plausible three dimensional effects, for exampl...
Douglas Enright, Stephen R. Marschner, Ronald Fedk...
AMS
2007
Springer
296views Robotics» more  AMS 2007»
15 years 10 months ago
Learning the Inverse Model of the Dynamics of a Robot Leg by Auto-imitation
Abstract Walking, running and hopping are based on self-stabilizing oscillatory activity. In contrast, aiming movements serve to direct a limb to a desired location and demand a qu...
Karl-Theodor Kalveram, André Seyfarth