Sciweavers

1818 search results - page 161 / 364
» How users use access control
Sort
View
128
Voted
FUNGAMES
2010
15 years 3 months ago
Recognizing self in puppet controlled virtual avatars
Recent work in neuroscience suggests that there is a common coding in the brain between perception, imagination and execution of movement. Further, this common coding is considere...
Ali Mazalek, Michael Nitsche, Sanjay Chandrasekhar...
105
Voted
ACNS
2004
Springer
77views Cryptology» more  ACNS 2004»
15 years 8 months ago
A Pay-per-Use DoS Protection Mechanism for the Web
Internet service providers have resisted deploying Denial-of-Service (DoS) protection mechanisms despite numerous research results in the area. This is so primarily because ISPs ca...
Angelos Stavrou, John Ioannidis, Angelos D. Keromy...
111
Voted
EDOC
2006
IEEE
15 years 8 months ago
Secure Dissemination of XML Content Using Structure-based Routing
The paper proposes an approach to content dissemination that exploits the structural properties of XML Document Object Model in order to provide efficient dissemination by at the...
Ashish Kundu, Elisa Bertino
101
Voted
CCS
2010
ACM
15 years 6 months ago
Scene tagging: image-based CAPTCHA using image composition and object relationships
In this paper, we propose a new form of image-based CAPTCHA we term "scene tagging". It tests the ability to recognize a relationship between multiple objects in an imag...
Peter Matthews, Cliff Changchun Zou
FGCS
2007
89views more  FGCS 2007»
15 years 2 months ago
Federated grid clusters using service address routed optical networks
Clusters of computers have emerged as cost-effective parallel and/or distributed computing systems for computationally intensive tasks. Normally, clusters are composed of high per...
Isaac D. Scherson, Daniel S. Valencia, Enrique Cau...