Sciweavers

1818 search results - page 203 / 364
» How users use access control
Sort
View
123
Voted
IJOE
2008
98views more  IJOE 2008»
15 years 5 months ago
OpenLabs Security Laboratory - The Online Security Experiment Platform
For experiments to be reproducible, it is important to have a known and controlled environment. This requires isolation from the surroundings. For security experiments, e.g. with h...
Johan Zackrisson, Charlie Svahnberg
ACSAC
2010
IEEE
15 years 3 months ago
Porscha: policy oriented secure content handling in Android
The penetration of cellular networks worldwide and emergence of smart phones has led to a revolution in mobile content. Users consume diverse content when, for example, exchanging...
Machigar Ongtang, Kevin R. B. Butler, Patrick Drew...
ICDCS
2010
IEEE
15 years 9 months ago
ESCUDO: A Fine-Grained Protection Model for Web Browsers
Web applications are no longer simple hyperlinked documents. They have progressively evolved to become highly complex—web pages combine content from several sources (with varyin...
Karthick Jayaraman, Wenliang Du, Balamurugan Rajag...
CE
2007
100views more  CE 2007»
15 years 5 months ago
Visualization of participation: Does it contribute to successful computer-supported collaborative learning?
This study investigated the effects of visualization of participation during computer-supported collaborative learning (CSCL). It is hypothesized that visualization of participat...
Jeroen Janssen, Gijsbert Erkens, Gellof Kanselaar,...
146
Voted
ICRA
2008
IEEE
177views Robotics» more  ICRA 2008»
15 years 11 months ago
Detecting and tracking of 3D face pose for human-robot interaction
— Faces play a major role in many HCI systems, because they represent a rich source of information. Being able to estimate the 3D face pose in real-time, we can get a clue about ...
Fadi Dornaika, Bogdan Raducanu