Sciweavers

708 search results - page 68 / 142
» Implementing access control to people location information
Sort
View
CSREASAM
2009
13 years 9 months ago
Specialized Solutions for Improvement of Firewall Performance and Conformity to Security Policy
- Until recently the reasons for reduced efficiency and limited implementation of new security systems has been the insufficient performance of hardware that executes access contro...
Vladimir S. Zaborovsky, Anton Titov
CG
2007
Springer
13 years 7 months ago
Storylines: Visual exploration and analysis in latent semantic spaces
Tasks in visual analytics differ from typical information retrieval tasks in fundamental ways. A critical part of a visual analytics is to ask the right questions when dealing wit...
Weizhong Zhu, Chaomei Chen
WSC
2001
13 years 9 months ago
Security issues in high level architecture based distributed simulation
The United States Department of Defense (DoD) has, over the past several years, emphasized the need to employ simulation based acquisition (SBA) in engineering and development. Di...
Asa Elkins, Jeffery W. Wilson, Denis Gracanin
TSD
2001
Springer
14 years 7 days ago
Determining User Interface Semantics Using Communicating Agents
The Internet offers remote access to many information systems to users independent of time and location. This paper describes an agent based approach to deal with issues that rise ...
L. Ton, Léon J. M. Rothkrantz
WECWIS
2009
IEEE
198views ECommerce» more  WECWIS 2009»
14 years 2 months ago
Bridging the Gap between User Attributes and Service Policies with Attribute Mapping
—People, companies, and public authorities can now have a strong on-line presence and a huge amount of interactions on the Internet, made possible by the impressive growth of the...
Davide Cerri, Francesco Corcoglioniti