Sciweavers

3712 search results - page 575 / 743
» Role-Based Access Control
Sort
View
CSFW
2005
IEEE
15 years 8 months ago
Nomad: A Security Model with Non Atomic Actions and Deadlines
Modelling security policies requires means to specify permissions and prohibitions. However, this is generally not sufficient to express security properties such as availability ...
Frédéric Cuppens, Nora Cuppens-Boula...
ICCV
2005
IEEE
15 years 8 months ago
Perceptive User Interface, a Generic Approach
Abstract. This paper describes the development of a real-time perceptive user interface. Two cameras are used to detect a user’s head, eyes, hand, fingers and gestures. These cu...
Michael Van den Bergh, Ward Servaes, Geert Caenen,...
ICCV
2005
IEEE
15 years 8 months ago
Fast Head Tilt Detection for Human-Computer Interaction
Abstract. Accurate head tilt detection has a large potential to aid people with disabilities in the use of human-computer interfaces and provide universal access to communication s...
Benjamin N. Waber, John J. Magee, Margrit Betke
ICDCS
2005
IEEE
15 years 8 months ago
An Update Protocol for XML Documents in Distributed and Cooperative Systems
Securing data is becoming a crucial need for most internet-based applications. Whereas the problem of data confidentiality has been widely investigated, the problem of how to ens...
Yunhua Koglin, Giovanni Mella, Elisa Bertino, Elen...
ICMCS
2005
IEEE
183views Multimedia» more  ICMCS 2005»
15 years 8 months ago
Bandwidth Estimation and Robust Video Streaming Over 802.11E Wireless Lans
Streaming high quality audio/video (AV) from home media sources to TV sets over a wireless local area network (WLAN) is a challenging problem because of the fluctuating bandwidth...
Mehmet Umut Demircin, Peter van Beek