Sciweavers

164 search results - page 27 / 33
» Intelligent High-Security Access Control
Sort
View
IUI
2004
ACM
14 years 1 months ago
Flexible interface migration
The goal of this work is to provide users immersed in a multi-platform environment with the possibility of interacting with an application while freely moving from one device to a...
Renata Bandelloni, Fabio Paternò
DALT
2004
Springer
14 years 29 days ago
A Protocol for Resource Sharing in Norm-Governed Ad Hoc Networks
Ad hoc networks may be viewed as computational systems whose members may fail to, or choose not to, comply with the rules governing their behaviour. We are investigating to what ex...
Alexander Artikis, Lloyd Kamara, Jeremy Pitt, Mare...
DRM
2003
Springer
14 years 23 days ago
How DRM-based content delivery systems disrupt expectations of "personal use"
We set out to examine whether current, DRM-based online offerings of music and movies accord with consumers’ current expectations regarding the personal use of copyrighted works...
Deirdre K. Mulligan, John Han, Aaron J. Burstein
ICDCSW
2002
IEEE
14 years 15 days ago
A Flexible, Privacy-Preserving Authentication Framework for Ubiquitous Computing Environments
The proliferation of smart gadgets, appliances, mobile devices, PDAs and sensors has enabled the construction of ubiquitous computing environments, transforming regular physical s...
Jalal Al-Muhtadi, Anand Ranganathan, Roy H. Campbe...
IWINAC
2009
Springer
14 years 4 days ago
Results of an Adaboost Approach on Alzheimer's Disease Detection on MRI
Abstract. In this paper we explore the use of the Voxel-based Morphometry (VBM) detection clusters to guide the feature extraction processes for the detection of Alzheimer's d...
Alexandre Savio, Maite García-Sebasti&aacut...