Sciweavers

262 search results - page 4 / 53
» Secure Hamming Distance Based Computation and Its Applicatio...
Sort
View
IDTRUST
2009
ACM
14 years 1 months ago
A calculus of trust and its application to PKI and identity management
We introduce a formal semantics based calculus of trust that explicitly represents trust and quantifies the risk associated with trust in public key infrastructure (PKI) and iden...
Jingwei Huang, David Nicol
WS
2004
ACM
14 years 14 days ago
A framework for wireless LAN monitoring and its applications
Many studies on measurement and characterization of wireless LANs (WLANs) have been performed recently. Most of these measurements have been conducted from the wired portion of th...
Jihwang Yeo, Moustafa Youssef, Ashok K. Agrawala
ICPR
2002
IEEE
14 years 8 hour ago
A Fast Narrow Band Method and Its Application in Topology-Adaptive 3-D Modeling
We present a new fast method of modeling 3-D objects of arbitrary topology. The Level Set Methods have been used by many researchers to recover 3-D shapes of arbitrary topology. H...
Shuntaro Yui, Kenji Hara, Hongbin Zha, Tsutomu Has...
ACMACE
2004
ACM
14 years 15 days ago
Magic mirror: a new VR platform design and its applications
This paper describes a case study of VR platform Magic Mirror and its applications that are economic in development process and cost, flexible by contents and installation conditi...
Ig-Jae Kim, Hyun Jin Lee, Hyoung-Gon Kim
SACMAT
2006
ACM
14 years 1 months ago
The secondary and approximate authorization model and its application to Bell-LaPadula policies
We introduce the concept, model, and policy-specific algorithms for inferring new access control decisions from previous ones. Our secondary and approximate authorization model (...
Jason Crampton, Wing Leung, Konstantin Beznosov