Sciweavers

722 search results - page 107 / 145
» Information Theory and Security: Quantitative Information Fl...
Sort
View
CCS
2008
ACM
15 years 1 months ago
On spatio-temporal constraints and inheritance in role-based access control
Pervasive computing environments have created a requirement for spatial- and temporal-aware access control systems. Although temporal, spatial and spatio-temporal role-based acces...
Liang Chen, Jason Crampton
ICML
2003
IEEE
16 years 19 days ago
Finding Underlying Connections: A Fast Graph-Based Method for Link Analysis and Collaboration Queries
Many techniques in the social sciences and graph theory deal with the problem of examining and analyzing patterns found in the underlying structure and associations of a group of ...
Jeremy Kubica, Andrew W. Moore, David Cohn, Jeff G...
MMM
2006
Springer
128views Multimedia» more  MMM 2006»
15 years 5 months ago
An improved distortion model for rate control of DCT-based video coding
This paper presents a rate control algorithm for the dominant discrete cosine transform (DCT) -based video coding. It is developed based on a more accurate rate-distortion (RD) mo...
Jun Xie, Liang-Tien Chia, Bu-Sung Lee
BCSHCI
2007
15 years 1 months ago
A survey on common practice in designing audio in the user interface
The current practice of designing the auditory mode in the user interface is poorly understood. In this survey, we aim at revealing the common understanding of the role of audio i...
Christopher Frauenberger, Tony Stockman, Marie-Luc...
WISTP
2007
Springer
15 years 6 months ago
Mobile Phones as Secure Gateways for Message-Based Ubiquitous Communication
Abstract. For ubiquitous communication self-organising adhoc networks become more and more important. We consider mobile phones as appropriate secure gateways to provide access to ...
Walter Bamberger, Oliver Welter, Stephan Spitz