Sciweavers

464 search results - page 23 / 93
» Authorisation Using Attributes from Multiple Authorities
Sort
View
79
Voted
TABLETOP
2006
IEEE
15 years 3 months ago
Transparent Tabletop Interface for Multiple Users on Lumisight Table
This paper presents a new type of tabletop interface on Lumisight Table. Putting physical objects on a tabletop display is one of the typical methods for intuitive tangible input....
Yasuaki Kakehi, Takero Hosomi, Makoto Iida, Takesh...
CVIU
2006
110views more  CVIU 2006»
14 years 9 months ago
Simultaneous tracking of multiple body parts of interacting persons
This paper presents a framework to simultaneously segment and track multiple body parts of interacting humans in the presence of mutual occlusion and shadow. The framework uses mu...
Sangho Park, Jake K. Aggarwal
HICSS
2008
IEEE
113views Biometrics» more  HICSS 2008»
15 years 4 months ago
Development and Validation of Scales to Measure the Strategic Potential of IT-Enabled Resources: A Resource-Based Approach
This paper describes the development of reliable and valid scales for assessing the strategic potential of IT-enabled resources. Following to the resource-based view of the firm (...
Saggi Nevo, Michael R. Wade
INFOCOM
2007
IEEE
15 years 4 months ago
Mesh or Multiple-Tree: A Comparative Study of Live P2P Streaming Approaches
Abstract—Existing approaches to P2P streaming can be divided into two general classes: (i) tree-based approaches use pushbased content delivery over multiple tree-shaped overlays...
Nazanin Magharei, Reza Rejaie, Yang Guo
DIM
2008
ACM
14 years 11 months ago
Minimal information disclosure with efficiently verifiable credentials
Public-key based certificates provide a standard way to prove one's identity, as attested by some certificate authority (CA). However, plain certificates provide a binary ide...
David Bauer, Douglas M. Blough, David Cash