Sciweavers

785 search results - page 111 / 157
» Two remarks on remotality
Sort
View
AOSD
2009
ACM
14 years 4 months ago
Enforcing security for desktop clients using authority aspects
Desktop client applications interact with both local and remote resources. This is both a benefit in terms of the rich features desktop clients can provide, but also a security r...
Brett Cannon, Eric Wohlstadter
CHI
2009
ACM
14 years 4 months ago
Gaze-controlled driving
We investigate if the gaze (point of regard) can control a remote vehicle driving on a racing track. Five different input devices (on-screen buttons, mousepointing low-cost webcam...
Martin Tall, Alexandre Alapetite, Javier San Agust...
CCS
2009
ACM
14 years 4 months ago
Physically restricted authentication with trusted hardware
Modern computer systems permit users to access protected information from remote locations. In certain secure environments, it would be desirable to restrict this access to a part...
Michael S. Kirkpatrick, Elisa Bertino
CEC
2009
IEEE
14 years 4 months ago
A Bacterial Evolutionary Algorithm for automatic data clustering
This paper describes an evolutionary clustering algorithm, which can partition a given dataset automatically into the optimal number of groups through one shot of optimization. The...
Swagatam Das, Archana Chowdhury, Ajith Abraham
CSE
2009
IEEE
14 years 4 months ago
Autonomous Management and Control of Sensor Network-Based Applications
—A central challenge facing sensor network research and development is the difficulty in providing effective autonomous management capability. This is due to a large number of p...
Antonio G. Ruzzelli, Conor Muldoon, Anthony Schoof...