Sciweavers

797 search results - page 144 / 160
» How to Compress Interactive Communication
Sort
View
JCS
2008
88views more  JCS 2008»
14 years 9 months ago
A privacy-aware access control system
The protection of privacy is an increasing concern in our networked society because of the growing amount of personal information that is being collected by a number of commercial...
Claudio Agostino Ardagna, Marco Cremonini, Sabrina...
JNCA
2008
113views more  JNCA 2008»
14 years 9 months ago
Hands-free vision-based interface for computer accessibility
Physically disabled and mentally challenged people are an important part of our society that has not yet received the same opportunities as others in their inclusion in the Inform...
Javier Varona, Cristina Manresa-Yee, Francisco J. ...
ENTCS
2007
88views more  ENTCS 2007»
14 years 9 months ago
Keeping Secrets in Resource Aware Components
We present a powerful and flexible method for automatically checking the secrecy of values inside components. In our framework an attacker may monitor the external communication ...
Tom Chothia, Jun Pang, Muhammad Torabi Dashti
DATAMINE
2002
139views more  DATAMINE 2002»
14 years 9 months ago
Using Site Semantics to Analyze, Visualize, and Support Navigation
To satisfy potential customers of a Web site and to lead them to the goods offered by the site, one should support them in the course of navigation they have embarked on. This pape...
Bettina Berendt
FGCS
2010
99views more  FGCS 2010»
14 years 8 months ago
A conceptual model for attribute aggregation
This paper describes a conceptual model for attribute aggregation that allows a service provider (SP) to authorise a user’s access request based on attributes asserted by multip...
David W. Chadwick, George Inman, Nate Klingenstein