Sciweavers

468 search results - page 42 / 94
» Interactivity for Reactive Access Control
Sort
View
CHI
2010
ACM
14 years 2 months ago
Investigating user account control practices
Non-administrator user accounts and the user account control (UAC) approach of Windows Vista are two practical solutions to limit the damage of malware infection. UAC in Windows V...
Sara Motiee, Kirstie Hawkey, Konstantin Beznosov
CHI
2009
ACM
14 years 8 months ago
The VoiceBot: a voice controlled robot arm
We present a system whereby the human voice may specify continuous control signals to manipulate a simulated 2D robotic arm and a real 3D robotic arm. Our goal is to move towards ...
Brandi House, Jonathan Malkin, Jeff Bilmes
IPPS
2008
IEEE
14 years 1 months ago
Scalable server provisioning with HOP-SCOTCH
The problem of provisioning servers in a cluster infrastructure includes the issues of coordinating access and sharing of physical resources, loading servers with the appropriate ...
David Daly, M. A. Silva, José E. Moreira
CSFW
2012
IEEE
11 years 9 months ago
Gran: Model Checking Grsecurity RBAC Policies
—Role-based Access Control (RBAC) is one of the most widespread security mechanisms in use today. Given the growing complexity of policy languages and access control systems, ver...
Michele Bugliesi, Stefano Calzavara, Riccardo Foca...
PDCAT
2005
Springer
14 years 27 days ago
Web Media Service based on Streaming Player supporting ubiquitous environment
This paper examines technique of media access that flexible media service, provided user interaction, and guaranteeing QoS. Currently, there are various streaming services, but th...
Sangok Kim, Kanghee Lee, Zhefan Jiang, Sangwook Ki...