Sciweavers

4445 search results - page 199 / 889
» Reflective Authorization Systems
Sort
View
ACSAC
2001
IEEE
15 years 8 months ago
DAIS: A Real-Time Data Attack Isolation System for Commercial Database Applications
Traditional database security mechanisms are very limited in defending successful data attacks. Authorized but malicious transactions can make a database useless by impairing its ...
Peng Liu
142
Voted
ICFHR
2010
176views Biometrics» more  ICFHR 2010»
14 years 11 months ago
The A2iA-Telecom ParisTech-UOB System for the ICDAR 2009 Handwriting Recognition Competition
This article describes the isolated word recognizer presented by the authors to the ICDAR 2009 French handwriting recognition competition. This system is a combination of three is...
Christopher Kermorvant, Farès Menasri, Anne...
TIM
2010
144views Education» more  TIM 2010»
14 years 11 months ago
A Decentralized Observer for Ship Power System Applications: Implementation and Experimental Validation
In the last few years, the growing complexity of the electrical power networks, mainly due to the increased use of electronic converters together with the requirements of a higher ...
Andrea Benigni, Gabriele D'Antona, U. Ghisla, Anto...
CHI
2003
ACM
16 years 5 months ago
Interface design for metadata creation
The rapid growth of the Web has increased the importance of decentralized metadata creation. Resource authors must create their own metadata to enable enhanced information seeking...
Abe Crystal
HICSS
2008
IEEE
117views Biometrics» more  HICSS 2008»
15 years 11 months ago
Online Gestures: Icon Use by Fan Communities on LiveJournal
This paper examines the use of icons as communication devices in persistent conversations. The paper presents findings from the author’s ethnographic study of a fan group on Liv...
Claudia Rebaza