Sciweavers

2250 search results - page 121 / 450
» Authorizing applications in singularity
Sort
View
IWANN
2009
Springer
15 years 4 months ago
Fuzzy Logic, Soft Computing, and Applications
We survey on the theoretical and practical developments of the theory of fuzzy logic and soft computing. Specifically, we briefly review the history and main milestones of fuzzy ...
Inma P. Cabrera, Pablo Cordero, Manuel Ojeda-Acieg...
ACSAC
1998
IEEE
15 years 2 months ago
Application-Level Isolation to Cope with Malicious Database Users
System protection mechanisms such as access controls can be fooled by authorized but malicious users, masqueraders, and misfeasors. Intrusion detection techniques are therefore us...
Sushil Jajodia, Peng Liu, Catherine D. McCollum
GLOBECOM
2007
IEEE
15 years 1 months ago
Channel Measurements of an Indoor Office Scenario for Wireless Sensor Applications
Ad-hoc networks and sensor networks, where nodes communicate with each other without fixed infrastructure, are of great importance for many industrial, environmental, and safety-r...
Shurjeel Wyne, Telmo Santos, Fredrik Tufvesson, An...
AVI
2008
15 years 9 days ago
Adapting a single-user, single-display molecular visualization application for use in a multi-user, multi-display environment
In this paper, we discuss the adaptation of an open-source single-user, single-display molecular visualization application for use in a multi-display, multi-user environment. Jmol...
Clifton Forlines, Ryan H. Lilien
HUC
2010
Springer
14 years 8 months ago
Locaccino: a privacy-centric location sharing application
Locaccino is a location sharing application designed to empower users to effectively control their privacy. It has been piloted by close to 2000 users and has been used by researc...
Eran Toch, Justin Cranshaw, Paul Hankes Drielsma, ...