Sciweavers

1627 search results - page 259 / 326
» On context in authorization policy
Sort
View
AVBPA
1997
Springer
140views Biometrics» more  AVBPA 1997»
14 years 1 months ago
Integrating Face Recognition into Security Systems
Automated processing of facial images has become a serious market for both hard- and software products. For the commercial success of face recognition systems it is most crucial th...
Volker Vetter, Thomas Zielke, Werner von Seelen
HOTOS
1993
IEEE
14 years 1 months ago
Using Reconciliation to Share Files Between Occasionally Connected Computers
Future large distributed systems will be made by interconnecting highly autonomous subsystems, rather than by building ever more elaborate complexes which attempt to provide a sin...
John H. Howard
CONCUR
1994
Springer
14 years 29 days ago
Weak Sequential Composition in Process Algebras
Abstract. In this paper we study a special operator for sequential composition, which is de ned relative to a dependency relation over the actions of a given system. The idea is th...
Arend Rensink, Heike Wehrheim
C5
2004
IEEE
14 years 18 days ago
Enabling Social Dimensions of Learning through a Persistent, Unified, Massively Multi-User, and Self-Organizing Virtual Environm
Existing online learning experiences lack the social dimension that characterizes learning in the real world. This social dimension extends beyond the traditional classroom into t...
Julian Lombardi, Mark P. McCahill
EKAW
2004
Springer
14 years 18 days ago
Towards a Knowledge-Aware Office Environment
The objective of the Semantic Web is to make the Web amenable to computer processing, and hence to improve the value that humans can obtain from it. One of the oft-touted user bene...
Les Carr, Timothy Miles-Board, Gary Wills, Arouna ...