Sciweavers

25137 search results - page 4950 / 5028
» Self-healing Information Systems
Sort
View
CCS
2006
ACM
14 years 2 months ago
RoleMiner: mining roles using subset enumeration
Role engineering, the task of defining roles and associating permissions to them, is essential to realize the full benefits of the role-based access control paradigm. Essentially,...
Jaideep Vaidya, Vijayalakshmi Atluri, Janice Warne...
FGR
2004
IEEE
216views Biometrics» more  FGR 2004»
14 years 2 months ago
Multimodal Coordination of Facial Action, Head Rotation, and Eye Motion during Spontaneous Smiles
Both the configuration of facial features and the timing of facial actions are important to emotion and communication. Previous literature has focused on the former. We developed ...
Jeffrey F. Cohn, Lawrence Ian Reed, Tsuyoshi Moriy...
EUROPAR
2006
Springer
14 years 2 months ago
Context Awareness: An Experiment with Hoarding
Abstract. Computer mobility allows people to use computers in varied and changing environments. This variability forces applications to adapt thus requiring awareness of the comput...
João Garcia, Luís Veiga, Paulo Ferre...
FC
2006
Springer
129views Cryptology» more  FC 2006»
14 years 2 months ago
Phoolproof Phishing Prevention
Abstract. Phishing, or web spoofing, is a growing problem: the Anti-Phishing Working Group (APWG) received almost 14,000 unique phishing reports in August 2005, a 56% jump over the...
Bryan Parno, Cynthia Kuo, Adrian Perrig
IWAN
2000
Springer
14 years 2 months ago
A Flexible IP Active Networks Architecture
This paper presents the main concepts of the IST Project FAIN "Future Active IP Networks" [10], a three-year collaborative research project, whose main task is to develo...
Alex Galis, Bernhard Plattner, Jonathan M. Smith, ...
« Prev « First page 4950 / 5028 Last » Next »