Recent technological advances have produced network interfaces that provide users with very low-latency access to the memory of remote machines. We examine the impact of such netw...
Leonidas I. Kontothanassis, Galen C. Hunt, Robert ...
In this paper, a high-performance face recognition terminal for access control systems is described. The terminal is specially designed to acquire stable face patterns for reliabl...
We describe a new widget and interaction technique, known as a “Frisbee,” for interacting with areas of a large display that are difficult or impossible to access directly. A ...
Azam Khan, George W. Fitzmaurice, Don Almeida, Nic...
The widespread acceptance and uptake of Grid technology can only be achieved if it can be ensured that the security mechanisms needed to support Grid based collaborations are at l...
Richard O. Sinnott, A. J. Stell, David W. Chadwick...
To avoid insider attacks one cannot rely on access control to protect a database scheme. Encrypting the database is a better option. This paper describes a working prototype of an ...
Richard Brinkman, Berry Schoenmakers, Jeroen Doume...