Sciweavers

789 search results - page 127 / 158
» Pushing using Compliance
Sort
View
IJRR
2010
186views more  IJRR 2010»
14 years 11 months ago
The Highly Adaptive SDM Hand: Design and Performance Evaluation
The inherent uncertainty associated with unstructured environments makes establishing a successful grasp difficult. Traditional approaches to this problem involve hands that are c...
Aaron M. Dollar, Robert D. Howe
SACMAT
2010
ACM
14 years 11 months ago
An architecture for enforcing end-to-end access control over web applications
The web is now being used as a general platform for hosting distributed applications like wikis, bulletin board messaging systems and collaborative editing environments. Data from...
Boniface Hicks, Sandra Rueda, Dave King 0002, Thom...
BIOSIG
2009
127views Biometrics» more  BIOSIG 2009»
14 years 11 months ago
Supplemental Biometric User Authentication for Digital-Signature Smart Cards
: This paper specifies how biometric verification methods can be applied in addition to PIN verification on digital-signature smart cards in compliance with established smart-card ...
Olaf Henniger, Ulrich Waldmann
IHI
2012
217views Healthcare» more  IHI 2012»
13 years 9 months ago
Declarative privacy policy: finite models and attribute-based encryption
Regulations and policies regarding Electronic Health Information (EHI) are increasingly complex. Federal and State policy makers have called for both education to increase stakeho...
Peifung E. Lam, John C. Mitchell, Andre Scedrov, S...
WWW
2004
ACM
16 years 2 months ago
ResEval: a web-based evaluation system for internal medicine house staff
The evaluation and assessment of physicians-in-training (house staff) is a complex task. Residency training programs are under increasing pressure [1] to provide accurate and comp...
Henry J. Feldman, Marc M. Triola