Sciweavers

3712 search results - page 504 / 743
» Role-Based Access Control
Sort
View
ICMCS
2006
IEEE
165views Multimedia» more  ICMCS 2006»
15 years 10 months ago
Partial LDA vs Partial PCA
Recently, 3D face recognition algorithms have outperformed 2D conventional approaches by adding depth data to the problem. However, independently of the nature (2D or 3D) of the a...
Antonio Rama, Francesc Tarres
ICNP
2006
IEEE
15 years 10 months ago
Rigorous Protocol Design in Practice: An Optical Packet-Switch MAC in HOL
— This paper reports on an experiment in network protocol design: we use novel rigorous techniques in the design process of a new protocol, in a close collaboration between syste...
Adam Biltcliffe, Michael Dales, Sam Jansen, Tom Ri...
ACISICIS
2005
IEEE
15 years 10 months ago
Security Service Framework for Home Network
Home networking is the collection of elements that process, manage, transport, and store information, enabling the connection and integration of multiple computing, control, monit...
Zhefan Jiang, Sangok Kim, Kanghee Lee, Hyunchul Ba...
ACSAC
2005
IEEE
15 years 10 months ago
Building a MAC-Based Security Architecture for the Xen Open-Source Hypervisor
We present the sHype hypervisor security architecture and examine in detail its mandatory access control facilities. While existing hypervisor security approaches aiming at high a...
Reiner Sailer, Trent Jaeger, Enriquillo Valdez, Ra...
ICRA
2005
IEEE
97views Robotics» more  ICRA 2005»
15 years 10 months ago
Cognitive Based Neural Prosthetics
– Intense activity in neural prosthetic research has recently demonstrated the possibility of robotic interfaces that respond directly to the nervous system. The question remains...
Richard A. Andersen, Sam Musallam, Joel W. Burdick...