Sciweavers

1818 search results - page 233 / 364
» How users use access control
Sort
View
ESSOS
2011
Springer
14 years 8 months ago
An Architecture-Centric Approach to Detecting Security Patterns in Software
Abstract. Today, software security is an issue with increasing importance. Developers, software designers, end users, and enterprises have their own needs w.r.t. software security....
Michaela Bunke, Karsten Sohr
AMDO
2006
Springer
15 years 8 months ago
Towards Hands-Free Interfaces Based on Real-Time Robust Facial Gesture Recognition
Abstract. Perceptual user interfaces are becoming important nowadays, because they offer a more natural interaction with the computer via speech recognition, haptics, computer visi...
Cristina Manresa-Yee, Xavier Varona, Francisco J. ...
WWW
2009
ACM
16 years 5 months ago
All your contacts are belong to us: automated identity theft attacks on social networks
Social networking sites have been increasingly gaining popularity. Well-known sites such as Facebook have been reporting growth rates as high as 3% per week [5]. Many social netwo...
Leyla Bilge, Thorsten Strufe, Davide Balzarotti, E...
IJCV
2006
117views more  IJCV 2006»
15 years 4 months ago
Programmable Imaging: Towards a Flexible Camera
In this paper, we introduce the notion of a programmable imaging system. Such an imaging system provides a human user or a vision system significant control over the radiometric an...
Shree K. Nayar, Vlad Branzoi, Terrance E. Boult
CSB
2004
IEEE
115views Bioinformatics» more  CSB 2004»
15 years 8 months ago
PoPS: A Computational Tool for Modeling and Predicting Protease Specificity
Proteases play a fundamental role in the control of intra- and extracellular processes by binding and cleaving specific amino acid sequences. Identifying these targets is extremel...
Sarah E. Boyd, Maria J. García de la Banda,...