Sciweavers

12568 search results - page 2491 / 2514
» Selective user interaction
Sort
View
DIMVA
2008
13 years 9 months ago
VeriKey: A Dynamic Certificate Verification System for Public Key Exchanges
Abstract. This paper presents a novel framework to substantiate selfsigned certificates in the absence of a trusted certificate authority. In particular, we aim to address the prob...
Brett Stone-Gross, David Sigal, Rob Cohn, John Mor...
I3
2007
13 years 9 months ago
Identity: How to name it, How to find it
The main objective of this work is to exploit the relationship between the information findability problem and a subject-based organization of information. Identification of a sub...
Christo Dichev, Darina Dicheva, Jan Fischer
RIAO
2007
13 years 9 months ago
Multimodal Segmentation of Lifelog Data
A personal lifelog of visual and audio information can be very helpful as a human memory augmentation tool. The SenseCam, a passive wearable camera, used in conjunction with an iR...
Aiden R. Doherty, Alan F. Smeaton, Keansub Lee, Da...
DBSEC
2004
170views Database» more  DBSEC 2004»
13 years 9 months ago
RBAC/MAC Security Analysis and Design for UML
In software construction, analysis investigates the boundary of a system (scope and requirements), its usage and access, and from a security perspective, who needs access to what ...
Thuong Doan, Steven A. Demurjian, Charles E. Phill...
GIL
2004
13 years 9 months ago
Web-basiertes GIS als Informationssystem interdisziplinerer Forschungsprojekte
Abstract: Interdisciplinary research projects with environmental focus need an information technology which is capable of describing the flow of minerals and other substances with ...
Claus Mückschel, Gabriel A. Schachtel, Jens N...
« Prev « First page 2491 / 2514 Last » Next »