Sciweavers

448 search results - page 4 / 90
» Who is in Control
Sort
View
125
Voted
PETRA
2010
ACM
15 years 6 months ago
Blink and wink detection for mouse pointer control
A Human-Computer Interaction (HCI) system that is designed for individuals with severe disabilities to simulate control of a traditional computer mouse is introduced. The camera-b...
Eric Missimer, Margrit Betke
ACSAC
2003
IEEE
15 years 9 months ago
Usable Access Control for the World Wide Web
While publishing content on the World Wide Web has moved within reach of the non-technical mainstream, controlling access to published content still requires expertise in Web serv...
Dirk Balfanz
115
Voted
COLCOM
2005
IEEE
15 years 9 months ago
Distributed floor control protocols for computer collaborative applications on overlay networks
— Computer supported collaborative applications on overlay networks are gaining popularity among users who are geographically dispersed. Examples of these kinds of applications i...
Shankar M. Banik, Sridhar Radhakrishnan, Tao Zheng...
COMSWARE
2007
IEEE
15 years 10 months ago
Role Based Access Control for UDDI Inquiries
— Web Services are commonly used by organizations for B2B integration and enterprise application integration. UDDI registries are widely used as mechanisms for businesses to list...
Raymond Peterkin, Jinsuk Solomon, Dan Ionescu
CEAS
2006
Springer
15 years 7 months ago
Dynamic Port 25 Blocking to Control SPAM Zombies
This paper presents the results of a case study in which outbound SPAM, here referring to excessive amounts of bulk-generated email, is suppressed using dynamic Port 25 blocking. ...
Jonathan Schmidt