Sciweavers

4753 search results - page 749 / 951
» Natural Modelling of Interactive Applications
Sort
View
RBAC
1998
85views more  RBAC 1998»
15 years 3 months ago
Control Principles and Role Hierarchies
Role-based access control (RBAC) has been introduced in the last few years, and offers a powerful means of specifying access control decisions. The model of RBAC usually assumes t...
Jonathan D. Moffett
CGF
2008
110views more  CGF 2008»
15 years 2 months ago
TimeRadarTrees: Visualizing Dynamic Compound Digraphs
The evolution of dependencies in information hierarchies can be modeled by sequences of compound digraphs with edge weights. In this paper we present a novel approach to visualize...
Michael Burch, Stephan Diehl
IJNSEC
2008
108views more  IJNSEC 2008»
15 years 2 months ago
Multiplicative Forward-Secure Threshold Signature Scheme
The devastating consequence of secret key exposure in digital signature is that any signature can be forged and cannot be trusted. To mitigate the damage of secret key exposure, f...
Sherman S. M. Chow, H. W. Go, Lucas Chi Kwong Hui,...
94
Voted
MONET
2008
123views more  MONET 2008»
15 years 2 months ago
Preserving Avatar Genuineness in Different Display Media
Our research focuses on enabling users to interact with others using 3D avatars with the same appearance and personality in different media such as the Internet, SMS or television ...
Maria del Puy Carretero, David Oyarzun, Amalia Ort...
98
Voted
IJON
2007
99views more  IJON 2007»
15 years 2 months ago
Criticality of avalanche dynamics in adaptive recurrent networks
In many studies of self-organized criticality (SOC), branching processes were used to model the dynamics of the activity of the system during avalanches. This mathematical simpliï...
Anna Levina, Udo Ernst, J. Michael Herrmann