Sciweavers

1472 search results - page 37 / 295
» Access control in virtual environments
Sort
View
SPC
2005
Springer
15 years 7 months ago
TrustAC: Trust-Based Access Control for Pervasive Devices
Alice first meets Bob in an entertainment shop, then, they wish to share multimedia content, but Do they know what are trustworthy users? How do they share such information in a s...
Florina Almenárez Mendoza, Andrés Ma...
ATAL
2008
Springer
15 years 3 months ago
Dancing the night away: controlling a virtual karaoke dancer by multimodal expressive cues
In this article, we propose an approach of nonverbal interaction with virtual agents to control agents' behavioral expressivity by extracting and combining acoustic and gestu...
Matthias Rehm, Thurid Vogt, Michael Wissner, Nikol...
FGCS
2008
159views more  FGCS 2008»
15 years 2 months ago
Access control management for ubiquitous computing
The purpose of ubiquitous computing is anywhere and anytime access to information within computing infrastructures that is blended into a background and no longer be reminded. Thi...
Hua Wang, Yanchun Zhang, Jinli Cao
ICC
2007
IEEE
123views Communications» more  ICC 2007»
15 years 8 months ago
Quality of Service in Wireless Network Diversity Multiple Access Protocols Based on a Virtual Time-Slot Allocation
— In this paper, we propose a new resource allocation mechanism which is designed to improve the multiuser detection of wireless network diversity multiple access (NDMA) protocol...
Ramiro Samano-Robles, Mounir Ghogho, Desmond C. Mc...
ICRA
1998
IEEE
109views Robotics» more  ICRA 1998»
15 years 6 months ago
A Virtual Excavator for Controller Development and Evaluation
In order to facilitate the testing and evaluation of control strategies and operator environments designed for heavy duty hydraulic machines, an excavator simulator has been devel...
Simon P. DiMaio, S. E. Salcudean, Claude Reboulet,...