Sciweavers

1818 search results - page 334 / 364
» How users use access control
Sort
View
EUROSYS
2010
ACM
14 years 2 months ago
Residue objects: a challenge to web browser security
A complex software system typically has a large number of objects in the memory, holding references to each other to implement an object model. Deciding when the objects should be...
Shuo Chen, Hong Chen, Manuel Caballero
USENIX
2007
13 years 11 months ago
From Trusted to Secure: Building and Executing Applications That Enforce System Security
Commercial operating systems have recently introduced mandatory access controls (MAC) that can be used to ensure system-wide data confidentiality and integrity. These protections...
Boniface Hicks, Sandra Rueda, Trent Jaeger, Patric...
CHI
2010
ACM
14 years 3 months ago
Cars, calls, and cognition: investigating driving and divided attention
Conversing on cell phones while driving an automobile is a common practice. We examine the interference of the cognitive load of conversational dialog with driving tasks, with the...
Shamsi T. Iqbal, Yun-Cheng Ju, Eric Horvitz
ICASSP
2008
IEEE
14 years 3 months ago
Localization of multiple speakers based on a two step acoustic map analysis
An interface for distant-talking control of home devices requires the possibility of identifying the positions of multiple users. Acoustic maps, based either on Global Coherence F...
Alessio Brutti, Maurizio Omologo, Piergiorgio Svai...
IROS
2008
IEEE
177views Robotics» more  IROS 2008»
14 years 3 months ago
Collision detection and reaction: A contribution to safe physical Human-Robot Interaction
Abstract— In the framework of physical Human-Robot Interaction (pHRI), methodologies and experimental tests are presented for the problem of detecting and reacting to collisions ...
Sami Haddadin, Alin Albu-Schäffer, Alessandro...