Sciweavers

1663 search results - page 13 / 333
» Computer Security in the Real World
Sort
View
78
Voted
ICDCSW
2009
IEEE
15 years 8 months ago
HAWK: Real-World Implementation of High-Performance Heterogeneous Wireless Network for Internet Access
Jiannong Cao, Kun Xie, Weigang Wu, Chuda Liu, Gang...
100
Voted
SP
1990
IEEE
15 years 5 months ago
Some Conundrums Concerning Separation of Duty
This paper examines some questions concerning commercial computer security integrity policies. We give an example of a dynamic separation of duty policy which cannot be implemente...
M. J. Nash, K. R. Poland
84
Voted
ICIP
2000
IEEE
16 years 3 months ago
3-D Reconstruction of Real-World Objects Using Extended Voxels
In this paper we present a voxel-based 3-D reconstruction technique that computes a set of non-transparent object surface voxels from a given set of calibrated camera views. We sh...
Eckehard G. Steinbach, Bernd Girod, Peter Eisert, ...
117
Voted
HUC
2000
Springer
15 years 5 months ago
Real-World Graphical User Interfaces
Although the age of information appliances is getting close, current remote control devices are too awkward, and we cannot control sophisticated equipments without using graphical ...
Toshiyuki Masui, Itiro Siio