Sciweavers

13224 search results - page 2411 / 2645
» Self-monitoring for Computer Users
Sort
View
ASSETS
2007
ACM
14 years 7 days ago
Automated tactile graphics translation: in the field
We address the practical problem of automating the process of translating figures from mathematics, science, and engineering textbooks to a tactile form suitable for blind student...
Chandrika Jayant, Matthew Renzelmann, Dana Wen, Sa...
CCS
2007
ACM
14 years 7 days ago
Efficient policy analysis for administrative role based access control
Administrative RBAC (ARBAC) policies specify how Role-Based Access Control (RBAC) policies may be changed by each administrator. It is often difficult to fully understand the effe...
Scott D. Stoller, Ping Yang, C. R. Ramakrishnan, M...
AICCSA
2007
IEEE
209views Hardware» more  AICCSA 2007»
14 years 6 days ago
LBS and GIS Technology Combination and Applications
Location Based Services (LBSs) provide personalized services to the subscribers based on their current position using Global Navigation Satellite System (GNSS), Geographic Informa...
Balqies Sadoun, Omar Al-Bayari
CTRSA
2007
Springer
93views Cryptology» more  CTRSA 2007»
14 years 5 days ago
Human Identification Through Image Evaluation Using Secret Predicates
Abstract. The task of developing protocols for humans to securely authenticate themselves to a remote server has been an interesting topic in cryptography as a replacement for the ...
Hassan Jameel, Riaz Ahmed Shaikh, Heejo Lee, Sungy...
DIM
2007
ACM
14 years 5 days ago
Linkability estimation between subjects and message contents using formal concepts
In this paper, we examine how conclusions about linkability threats can be drawn by analyzing message contents and subject knowledge in arbitrary communication systems. At first, ...
Stefan Berthold, Sebastian Clauß
« Prev « First page 2411 / 2645 Last » Next »