Sciweavers

2564 search results - page 371 / 513
» Human Computer Interaction Based Intrusion Detection
Sort
View
DBSEC
2008
188views Database» more  DBSEC 2008»
13 years 9 months ago
On the Formal Analysis of a Spatio-temporal Role-Based Access Control Model
With the growing use of wireless networks and mobile devices, we are moving towards an era where spatial and temporal information will be necessary for access control. The use of s...
Manachai Toahchoodee, Indrakshi Ray
CHI
2004
ACM
14 years 8 months ago
Affective sensors, privacy, and ethical contracts
Sensing affect raises critical privacy concerns, which are examined here using ethical theory, and with a study that illuminates the connection between ethical theory and privacy....
Carson Reynolds, Rosalind W. Picard
HAPTICS
2005
IEEE
14 years 1 months ago
Wearable Kinesthetic System for Capturing and Classifying Upper Limb Gesture
Background: Monitoring body kinematics has fundamental relevance in several biological and technical disciplines. In particular the possibility to exactly know the posture may fur...
R. Bartalesi, Federico Lorussi, M. Tesconi, Alessa...
ICSE
2008
IEEE-ACM
14 years 9 months ago
Power through brokering: open source community participation in software engineering student projects
Many software engineering projects use open source software tools or components. The project team's active participation in the open source community may be necessary for the...
Birgit R. Krogstie
CVPR
2010
IEEE
14 years 1 months ago
Variational Segmentation of Elongated Volumetric Structures
We present an interactive approach for segmenting thin volumetric structures. The proposed segmentation model is based on an anisotropic weighted Total Variation energy with a glo...
Christian Reinbacher, Thomas Pock, Christian Bauer...