Sciweavers

580 search results - page 86 / 116
» The Interaction of Access Control and Object-Orientation in ...
Sort
View
PG
1997
IEEE
13 years 11 months ago
Real-time virtual humans
The last few years have seen great maturationin the computation speed and control methods needed to portray 3D virtualhumanssuitableforreal interactiveapplications. We first desc...
Norman I. Badler
CHI
2009
ACM
14 years 8 months ago
Real life challenges in access-control management
In this work we ask the question: what are the challenges of managing a physical or file system access-control policy for a large organization? To answer the question, we conducte...
Lujo Bauer, Lorrie Faith Cranor, Robert W. Reeder,...
CHI
1995
ACM
13 years 11 months ago
A Virtual Window on Media Space
The Virtual Window system uses head movements in a local office to control camera movement in a remote office. The result is like a window allowing exploration of remote scenes ra...
William W. Gaver, Gerda Smets, Kees Overbeeke
PERCOM
2011
ACM
12 years 11 months ago
PoX: Protecting users from malicious Facebook applications
Abstract—Online social networks such as Facebook, MySpace, and Orkut store large amounts of sensitive user data. While a user can legitimately assume that a social network provid...
Manuel Egele, Andreas Moser, Christopher Kruegel, ...
WWW
2009
ACM
14 years 8 months ago
Retaining personal expression for social search
Web is being extensively used for personal expression, which includes ratings, reviews, recommendations, blogs. This user created content, e.g. book review on Amazon.com, becomes ...
Praphul Chandra, Ajay Gupta