Sciweavers

464 search results - page 86 / 93
» Authorisation Using Attributes from Multiple Authorities
Sort
View
ASPLOS
2006
ACM
14 years 11 months ago
Tradeoffs in fine-grained heap memory protection
Different uses of memory protection schemes have different needs in terms of granularity. For example, heap security can benefit from chunk separation (by using protected "pa...
Jianli Shen, Guru Venkataramani, Milos Prvulovic
CANDC
2007
ACM
15 years 1 months ago
Eye-balls: juggling with the virtual
The authors will introduce and demonstrate a novel computer vision based system for augmented performance. Unlike previous systems, which have primarily focused on `high art'...
Joe Marshall, Steve Benford, Tony P. Pridmore
SIGCOMM
1998
ACM
15 years 1 months ago
The MASC/BGMP Architecture for Inter-Domain Multicast Routing
Multicast routing enables e cient data distribution to multiple recipients. However, existing work has concentrated on extending single-domain techniques to wide-area networks, ra...
Satish Kumar, Pavlin Radoslavov, David Thaler, Cen...
CHI
2010
ACM
15 years 4 months ago
Bringing the field into focus: user-centered design of a patient expertise locator
Managing personal aspects of health is challenging for many patients, particularly those facing a serious condition such as cancer. Finding experienced patients, who can share the...
Andrea Civan-Hartzler, David W. McDonald, Chris Po...
100
Voted
ICASSP
2009
IEEE
15 years 4 months ago
Data hiding in hard-copy text documents robust to print, scan and photocopy operations
This paper describes a method for hiding data inside printed text documents that is resilient to print/scan and photocopying operations. Using the principle of channel coding with...
Avinash L. Varna, Shantanu Rane, Anthony Vetro