Sciweavers

1353 search results - page 119 / 271
» Securing Current and Future Process Control Systems
Sort
View
143
Voted
TKDE
2008
177views more  TKDE 2008»
15 years 3 months ago
Analyzing and Managing Role-Based Access Control Policies
Today more and more security-relevant data is stored on computer systems; security-critical business processes are mapped to their digital counterparts. This situation applies to ...
Karsten Sohr, Michael Drouineaud, Gail-Joon Ahn, M...
150
Voted
MM
2003
ACM
167views Multimedia» more  MM 2003»
15 years 8 months ago
Avatar motion control by user body postures
This paper describes a virtual reality system that realizes both an avatar motion control and a virtual object manipulation without avatar representation. Our goal is to do seamle...
Satoshi Yonemoto, Hiroshi Nakano, Rin-ichiro Tanig...
116
Voted
FCCM
1998
IEEE
107views VLSI» more  FCCM 1998»
15 years 7 months ago
Frequency-Domain Sonar Processing in FPGAs and DSPs
Over the past year we have been exploring the use of FPGA-based custom computing machines for several sonar beamforming applications, including time-domain beamforming[1], frequen...
Paul Graham, Brent E. Nelson
127
Voted
RTSS
1999
IEEE
15 years 7 months ago
HoneyWEB: Embedded Web-based Control Applications
High performance monitoring and control of real-time environments over the Internet is of importance to many users. The general public, as well as professionals, desires the abili...
Christiane Iaccarino, Meridith A. Sigel, Ralph E. ...
133
Voted
EUROPKI
2009
Springer
15 years 1 months ago
A Computational Framework for Certificate Policy Operations
The trustworthiness of any Public Key Infrastructure (PKI) rests upon the expectations for trust, and the degree to which those expectations are met. Policies, whether implicit as ...
Gabriel A. Weaver, Scott A. Rea, Sean W. Smith