Sciweavers

8503 search results - page 1355 / 1701
» Secure Software Architectures
Sort
View
COMPUTER
1999
108views more  COMPUTER 1999»
15 years 3 months ago
Distance Visualization: Data Exploration on the Grid
Scientific visualization has emerged as an important tool for extracting meaning from the large volumes of data produced by scientific instruments and simulations. Increasingly, t...
Ian T. Foster, Joseph A. Insley, Gregor von Laszew...
PAMI
2007
150views more  PAMI 2007»
15 years 3 months ago
Continuous Verification Using Multimodal Biometrics
—Conventional verification systems, such as those controlling access to a secure room, do not usually require the user to reauthenticate himself for continued access to the prote...
Terence Sim, Sheng Zhang, Rajkumar Janakiraman, Sa...
144
Voted
IMC
2010
ACM
15 years 1 months ago
Netalyzr: illuminating the edge network
In this paper we present Netalyzr, a network measurement and debugging service that evaluates the functionality provided by people's Internet connectivity. The design aims to...
Christian Kreibich, Nicholas Weaver, Boris Nechaev...
135
Voted
CORR
2010
Springer
136views Education» more  CORR 2010»
15 years 29 days ago
Personalized Data Set for Analysis
Data Management portfolio within an organization has seen an upsurge in initiatives for compliance, security, repurposing and storage within and outside the organization. When suc...
Vishal Gupta, Ashutosh Saxena
134
Voted
ARESEC
2011
145views more  ARESEC 2011»
14 years 3 months ago
An Attribute Based Framework for Risk-Adaptive Access Control Models
—The concept of risk-based adaptive access control (RAdAC, pronounced Raid-ack) has been recently introduced in the literature. It seeks to automatically (or semi-automatically) ...
Savith Kandala, Ravi S. Sandhu, Venkata Bhamidipat...
« Prev « First page 1355 / 1701 Last » Next »