Sciweavers

3121 search results - page 555 / 625
» Information Survivability Control Systems
Sort
View
114
Voted
ESORICS
2004
Springer
15 years 9 months ago
Parameterized Authentication
We describe an approach to sensor-based authentication that can adapt to accommodate incomplete, unreliable, or inaccurate input provided to the system. Parameterized Authenticatio...
Michael J. Covington, Mustaque Ahamad, Irfan A. Es...
131
Voted
ICIAR
2004
Springer
15 years 9 months ago
Appearance-Based Object Detection in Space-Variant Images: A Multi-model Approach
Recently, log-polar images have been successfully used in active-vision tasks such as vergence control or target tracking. However, while the role of foveal data has been exploited...
V. Javier Traver, Alexandre Bernardino, Plinio Mor...
131
Voted
ISW
2004
Springer
15 years 9 months ago
A Distributed High Assurance Reference Monitor
Abstract Ajay Chander1 , Drew Dean2 , and John Mitchell3 1 DoCoMo Communications Laboratories USA, San Jose, CA 95110 2 Computer Science Laboratory, SRI International, Menlo Park, ...
Ajay Chander, Drew Dean, John C. Mitchell
106
Voted
KES
2004
Springer
15 years 9 months ago
comDesk: A Cooperative Assistance Tool Based on P2P Techniques
We have designed and implemented a desktop sharing system based on P2P (peer-to-peer) techniques, named “comDesk,” which enables users to exchange the desktop images as well as...
Motoki Miura, Buntarou Shizuki, Jiro Tanaka
155
Voted
MATA
2004
Springer
101views Communications» more  MATA 2004»
15 years 9 months ago
Mobile Tourist Guide Services with Software Agents
Applications for mobile devices have some restrictions because of the limited capabilities and heterogeneity of these devices. However, their communication capabilities allow the d...
Juan Pavón, Juan M. Corchado, Jorge J. G&oa...