Sciweavers

3544 search results - page 453 / 709
» Information Security in Open Systems
Sort
View
CCS
2010
ACM
15 years 6 months ago
Effective trust management through a hybrid logical and relational approach
Despite a plethora of recent research regarding trust management approaches to authorization, relatively little attention has been given to exactly how these technologies can be e...
Adam J. Lee, Ting Yu, Yann Le Gall
SACMAT
2009
ACM
15 years 6 months ago
xDomain: cross-border proofs of access
A number of research systems have demonstrated the benefits of accompanying each request with a machine-checkable proof that the request complies with access-control policy — a...
Lujo Bauer, Limin Jia, Michael K. Reiter, David Sw...
SAC
2006
ACM
15 years 5 months ago
BambooTrust: practical scalable trust management for global public computing
Global public computing platforms, such as PlanetLab, grid computing systems, and XenoServers, require facilities for managing trust to allow their participants to interact effect...
Evangelos Kotsovinos, Aled Williams
RAS
2002
105views more  RAS 2002»
14 years 11 months ago
Visually guided manipulation tasks
In this paper, we present a framework for a robotic system with the ability to perform real-world manipulation tasks. The complexity of such tasks determines the precision and fre...
Danica Kragic, Lars Petersson, Henrik I. Christens...
GI
2009
Springer
14 years 9 months ago
An Adaptative Framework for Tracking Web-based Learning Environments
: Collecting and sharing attention information represents a main concern within the Technology Enhanced Learning community, as the number of works or projects related to this topic...
Valentin Butoianu, Philippe Vidal, Julien Broisin