Sciweavers

1818 search results - page 219 / 364
» How users use access control
Sort
View
ICRA
2002
IEEE
166views Robotics» more  ICRA 2002»
15 years 10 months ago
Real Time Visualization of Robot State with Mobile Virtual Reality
— With the deployment of large, distributed networks of cameras and other sensors, it is becoming necessary to also address the issue of how to effectively present the large vol...
Peter Amstutz, Andrew H. Fagg
IADIS
2008
15 years 6 months ago
Web Mining: A Key to Improve Business on Web
This paper takes an overview of the web mining concept and how it can be useful and beneficial to the business improvement by facilitating its applications in various areas over t...
Pradnya Purandare
DEON
2008
Springer
15 years 6 months ago
Specifying Intrusion Detection and Reaction Policies: An Application of Deontic Logic
The security policy of an information system may include a wide range of different requirements. The literature has primarily focused on access and information flow control require...
Nora Cuppens-Boulahia, Frédéric Cupp...
AICCSA
2008
IEEE
283views Hardware» more  AICCSA 2008»
15 years 11 months ago
Performance analysis of identity management in the Session Initiation Protocol (SIP)
The Session Initiation Protocol (SIP) is a standard for managing IP multimedia sessions in the Internet. Identity management in SIP is a crucial security field that deals with id...
Yacine Rebahi, Jordi Jaen Pallares, Tuan Minh Nguy...
HICSS
2002
IEEE
150views Biometrics» more  HICSS 2002»
15 years 10 months ago
An Architecture for Location Aware Applications
This paper presents an architecture for location aware applications, where positioning sources such as GPS, WaveLAN and Bluetooth devices can be seamlessly interchanged or even co...
James Nord, Kåre Synnes, Peter Parnes