Sciweavers

272 search results - page 36 / 55
» Exploring the acceptability envelope
Sort
View
SP
1999
IEEE
145views Security Privacy» more  SP 1999»
15 years 1 months ago
A User-Centered, Modular Authorization Service Built on an RBAC Foundation
Psychological acceptability has been mentioned as a requirement for secure systems for as long as least privilege and fail safe defaults, but until now has been all but ignored in...
Mary Ellen Zurko, Richard Simon, Tom Sanfilippo
70
Voted
MLDM
1999
Springer
15 years 1 months ago
Independent Feature Analysis for Image Retrieval
Content-based image retrieval methods based on the Euclidean metric expect the feature space to be isotropic. They su€er from unequal di€erential relevance of features in comput...
Jing Peng, Bir Bhanu
CHI
1996
ACM
15 years 1 months ago
Silk from a Sow's Ear: Extracting Usable Structures from the Web
In its current implementation, the World-Wide Web lacks much of the explicit structure and strong typing found in many closed hypertext systems. While this property has directly f...
Peter Pirolli, James E. Pitkow, Ramana Rao
FPGA
2000
ACM
175views FPGA» more  FPGA 2000»
15 years 1 months ago
An FPGA implementation and performance evaluation of the Serpent block cipher
With the expiration of the Data Encryption Standard (DES) in 1998, the Advanced Encryption Standard (AES) development process is well underway. It is hoped that the result of the ...
Adam J. Elbirt, Christof Paar
IMS
2000
123views Hardware» more  IMS 2000»
15 years 1 months ago
Exploiting On-Chip Memory Bandwidth in the VIRAM Compiler
Many architectural ideas that appear to be useful from a hardware standpoint fail to achieve wide acceptance due to lack of compiler support. In this paper we explore the design of...
David Judd, Katherine A. Yelick, Christoforos E. K...