Sciweavers

2270 search results - page 140 / 454
» Modelling Secure IT Systems - A Survey
Sort
View
SOUPS
2009
ACM
14 years 3 months ago
Revealing hidden context: improving mental models of personal firewall users
The Windows Vista personal firewall provides its diverse users with a basic interface that hides many operational details. However, concealing the impact of network context on th...
Fahimeh Raja, Kirstie Hawkey, Konstantin Beznosov
GW
1999
Springer
223views Biometrics» more  GW 1999»
14 years 1 months ago
Vision-Based Gesture Recognition: A Review
Abstract. The use of gesture as a natural interface serves as a motivating force for research in modeling, analyzing and recognition of gestures. In particular, human computer inte...
Ying Wu, Thomas S. Huang
MICCAI
1998
Springer
14 years 1 months ago
Virtual Reality Vitrectomy Simulator
In this study, a virtual reality vitrectomy simulator is being developed to assist Ophthalmolgy residents in correcting retinal detachments. To simulate this type of surgery, a thr...
Paul F. Neumann, Lewis L. Sadler, Jon Gieser
CACM
1999
132views more  CACM 1999»
13 years 8 months ago
Agents That Buy and Sell
Software agents have become very popular in the last six or so years. They have been used successfully to filter information, match people with similar interests and automate repe...
Pattie Maes, Robert H. Guttman, Alexandros Moukas
CCS
2007
ACM
14 years 3 months ago
Administration in role-based access control
Administration of large-scale RBAC systems is a challenging open problem. We propose a principled approach in designing and analyzing administrative models for RBAC. We identify s...
Ninghui Li, Ziqing Mao