Sciweavers

4859 search results - page 838 / 972
» Distributed Computing in a Heterogeneous Computing Environme...
Sort
View
143
Voted
CCS
1998
ACM
15 years 7 months ago
Authenticated Group Key Agreement and Friends
Many modern computing environments involve dynamic peer groups. Distributed simulation, multi-user games, conferencing and replicated servers are just a few examples. Given the op...
Giuseppe Ateniese, Michael Steiner, Gene Tsudik
CSFW
1992
IEEE
15 years 7 months ago
Attribute Support for Inter-Domain Use
Mary Ellen Zurko Laboratory for Computer Science Massachusetts Institute of Technology and Digital Equipment Corporation Littleton, MA, 01460 This paper describes the User Attribu...
Mary Ellen Zurko
114
Voted
ATAL
2006
Springer
15 years 7 months ago
Synthetic humans in emergency response drills
Being able to realistically simulate humans in emergency response activities is a key challenge for advancing the field of information technology for emergency response. Building ...
Daniel Massaguer, Vidhya Balasubramanian, Sharad M...
DBSEC
2007
131views Database» more  DBSEC 2007»
15 years 4 months ago
Dynamic Event-Based Access Control as Term Rewriting
Abstract. Despite the widespread adoption of Role-based Access Control (RBAC) models, new access control models are required for new applications for which RBAC may not be especial...
Clara Bertolissi, Maribel Fernández, Steve ...
118
Voted
ICVGIP
2008
15 years 4 months ago
Audio-Visual Person Authentication with Multiple Visualized-Speech Features and Multiple Face Profiles
We present an Audio-visual person authentication system which extracts several novel "VisualizedSpeech-Features" (VSF) from the spoken-password and multiple face profile...
Amitava Das, Ohil K. Manyam, Makarand Tapaswi