Sciweavers

26957 search results - page 82 / 5392
» Information Systems Modernization
Sort
View
77
Voted
CCS
2009
ACM
15 years 7 months ago
Physically restricted authentication with trusted hardware
Modern computer systems permit users to access protected information from remote locations. In certain secure environments, it would be desirable to restrict this access to a part...
Michael S. Kirkpatrick, Elisa Bertino
99
Voted
GRAPHITE
2004
ACM
15 years 6 months ago
Real-time painterly rendering for MR applications
In this paper we describe a real-time system for AR/MR rendering applications in a painterly style. Impressionistic images are created using a large number of brush strokes, which...
Michael Haller, Daniel Sperl
HF
2002
95views more  HF 2002»
15 years 11 days ago
Formal Verification of Human-Automation Interaction
This paper discusses a formal and rigorous approach to the analysis of operator interaction with machines. It addresses the acute problem of detecting design errors in human-machi...
Asaf Degani, Michael Heymann
80
Voted
INFOCOM
2003
IEEE
15 years 5 months ago
Physical Topology Discovery for Large Multi-Subnet Networks
— Knowledge of the up-to-date physical (i.e., layer-2) topology of an Ethernet network is crucial to a number of critical network management tasks, including reactive and proacti...
Yigal Bejerano, Yuri Breitbart, Minos N. Garofalak...
123
Voted
IPPS
2007
IEEE
15 years 7 months ago
A Peer-to-Peer Infrastructure for Autonomous Grid Monitoring
Modern grids have become very complex by their size and their heterogeneity. It makes the deployment and maintenance of systems a difficult task requiring lots of efforts from ad...
Laurent Baduel, Satoshi Matsuoka