Sciweavers

1818 search results - page 146 / 364
» How users use access control
Sort
View
CAD
2011
Springer
13 years 4 months ago
Mesh repair with user-friendly topology control
Limitations of current 3D acquisition technology often lead to polygonal meshes exhibiting a number of geometrical and topological defects which prevent them from widespread use. ...
Franck Hétroy, Stéphanie Rey, Carlos...
MOBISYS
2007
ACM
14 years 9 months ago
SmokeScreen: flexible privacy controls for presence-sharing
Presence-sharing is an emerging platform for mobile applications, but presence-privacy remains a challenge. Privacy controls must be flexible enough to allow sharing between both ...
Landon P. Cox, Angela Dalton, Varun Marupadi
CCS
2000
ACM
14 years 1 months ago
Security enhanced mobile agents
This paper describes a security model for mobile agent based systems. The model defines the notion of a security-enhanced agent and outlines security management components in agen...
Vijay Varadharajan
AICT
2005
IEEE
117views Communications» more  AICT 2005»
14 years 3 months ago
Managing Pi-resources in 4G Wireless Systems: The Opportunistic Way
Integration of different radio access networks will become a reality in a near future. Our interworking architecture assumes a ubiquitous primary network (the cellular one) and se...
Pedro Sobral, Luis Bernardo, Paulo Pinto
MDAI
2007
Springer
14 years 3 months ago
A Public-Key Protocol for Social Networks with Private Relationships
Abstract. The need for protecting the privacy of relationships in social networks has recently been stressed in the literature. Conventional protection mechanisms in those networks...
Josep Domingo-Ferrer