Sciweavers

464 search results - page 64 / 93
» Authorisation Using Attributes from Multiple Authorities
Sort
View
COMPSEC
2002
185views more  COMPSEC 2002»
14 years 9 months ago
A framework for understanding and predicting insider attacks
In this paper an insider attack is considered to be deliberate misuse by those who are authorized to use computers and networks. Applying this definition in real-life settings to ...
E. Eugene Schultz
CVPR
2005
IEEE
15 years 11 months ago
Multimodal Face Recognition: Combination of Geometry with Physiological Information
It is becoming increasingly important to be able to credential and identify authorized personnel at key points of entry. Such identity management systems commonly employ biometric...
Ioannis A. Kakadiaris, Georgios Passalis, Theohari...
HICSS
2003
IEEE
88views Biometrics» more  HICSS 2003»
15 years 3 months ago
Expanding Citizen Access and Public Official Accountability through Knowledge Creation Technology: One Recent Development in e-D
The authors describe an addition to the conversation regarding enhanced democracy through technologicallyassisted means (e-Democracy) focusing on enhancing and expanding the typic...
Michael A. Shires, Murray S. Craig
HUC
2010
Springer
14 years 10 months ago
Psycho-physiological measures for assessing cognitive load
With a focus on presenting information at the right time, the ubicomp community can benefit greatly from learning the most salient human measures of cognitive load. Cognitive load...
Eija Haapalainen, Seungjun Kim, Jodi Forlizzi, Ani...
ECOI
2007
101views more  ECOI 2007»
14 years 9 months ago
Reasoning about taxonomies in first-order logic
Experts often disagree about the organization of biological taxa. The shifting definitions of taxonomic names complicate otherwise simple queries concerning these taxa. For examp...
David Thau, Bertram Ludäscher