Sciweavers

448 search results - page 23 / 90
» Who is in Control
Sort
View
ACSW
2007
15 years 5 months ago
Usability and Privacy in Identity Management Architectures
Digital identities represent who we are when engaging in online activities and transactions. The rapid growth in the number of online services leads to in an increasing number of ...
Audun Jøsang, Mohammed Al Zomai, Suriadi Su...
CORR
2008
Springer
110views Education» more  CORR 2008»
15 years 4 months ago
Audit and Change Analysis of Spreadsheets
Because spreadsheets have a large and growing importance in real-world work, their contents need to be controlled and validated. Generally spreadsheets have been difficult to veri...
John C. Nash, Neil Smith, Andy Adler
HAPTICS
2009
IEEE
15 years 10 months ago
Role determination in human-human interaction
Physical human-robot interaction can be significantly improved when being aware about the role each partner takes in a joint manipulation task. This holds especially in computer ...
Nikolay Stefanov, Angelika Peer, Martin Buss
SEC
2008
15 years 5 months ago
Negotiation of Prohibition: An Approach Based on Policy Rewriting
Abstract. In recent security architectures, it is possible that the security policy is not evaluated in a centralized way but requires negotiation between the subject who is reques...
Nora Cuppens-Boulahia, Frédéric Cupp...
MMB
2012
Springer
240views Communications» more  MMB 2012»
13 years 11 months ago
A Demand-Response Calculus with Perfect Batteries
We consider an electricity consumer equipped with a perfect battery, who needs to satisfy a non-elastic load, subject to external control signals. The control imposes a time-varyin...
Jean-Yves Le Boudec, Dan-Cristian Tomozei