Sciweavers

1818 search results - page 164 / 364
» How users use access control
Sort
View
EUROMICRO
2000
IEEE
14 years 2 months ago
Agent-Based Adaptive Selection and Interaction to Z39.50 Servers
Digital libraries and OPACs are offering an enormous collection of information resources which can be accessed through Internet by quite different users thanks to the existence of...
Camino Fernández, Ignacio Aedo, Paloma D&ia...
USENIX
2001
13 years 11 months ago
Sandboxing Applications
Users frequently have to choose between functionality and security. When running popular Web browsers or email clients, they frequently find themselves turning off features such a...
Vassilis Prevelakis, Diomidis Spinellis
DSRT
2008
IEEE
14 years 4 months ago
Simulation Driven Experiment Control in Driver Assistance Assessment
Embedded systems technologies and advances in micro electronics have accelerated the evolution of driver assistance systems towards more driving safety, comfort, entertainment and...
Andreas Riener, Alois Ferscha
TSMC
2011
228views more  TSMC 2011»
13 years 4 months ago
Privacy-Preserving Outlier Detection Through Random Nonlinear Data Distortion
— Consider a scenario in which the data owner has some private/sensitive data and wants a data miner to access it for studying important patterns without revealing the sensitive ...
Kanishka Bhaduri, Mark D. Stefanski, Ashok N. Sriv...
ICDE
2006
IEEE
135views Database» more  ICDE 2006»
14 years 3 months ago
A Day in the Life of a Metamorphic Petrologist
— In this paper, we describe the functionality of a toolkit for sharing and long-term use of different types of geological data sets across disciplines. Our tools allow users to ...
Sibel Adali, Bouchra Bouqata, Adam Marcus 0002, Fr...