Sciweavers

1206 search results - page 136 / 242
» Modelling Information Systems as Object Societies
Sort
View
IJRR
2011
159views more  IJRR 2011»
14 years 5 months ago
Learning visual representations for perception-action systems
We discuss vision as a sensory modality for systems that effect actions in response to perceptions. While the internal representations informed by vision may be arbitrarily compl...
Justus H. Piater, Sébastien Jodogne, Renaud...
SIGECOM
2009
ACM
117views ECommerce» more  SIGECOM 2009»
15 years 4 months ago
Sybilproof transitive trust protocols
We study protocols to enable one user (the principal) to make potentially profitable but risky interactions with another user (the agent), in the absence of direct trust between ...
Paul Resnick, Rahul Sami
CCS
2009
ACM
15 years 2 months ago
TruWallet: trustworthy and migratable wallet-based web authentication
Identity theft has fostered to a major security problem on the Internet, in particular stealing passwords for web applications through phishing and malware. We present TruWallet, ...
Sebastian Gajek, Hans Löhr, Ahmad-Reza Sadegh...
CONTEXT
2007
Springer
15 years 4 months ago
Between Symbol and Language-in-use
Indexing is often designed with the intent of dimensional reduction, that is, of generating standardised and uniform descriptive metadata. This could be characterised as a process ...
Emma Tonkin
SAC
2005
ACM
15 years 3 months ago
An attribute-based access matrix model
In traditional access control models like MAC, DAC, and RBAC, authorization decisions are determined according to identities of subjects and objects, which are authenticated by a ...
Xinwen Zhang, Yingjiu Li, Divya Nalla