Sciweavers

5722 search results - page 230 / 1145
» Security Function Interactions
Sort
View
CORR
2010
Springer
88views Education» more  CORR 2010»
15 years 3 months ago
Function and form of gestures in a collaborative design meeting
This paper examines the relationship between gestures' function and form in design collaboration. It adopts a cognitive design research viewpoint. The analysis is restricted t...
Willemien Visser
EWC
2000
90views more  EWC 2000»
15 years 2 months ago
Function in Device Representation
We explore the meanings of the terms as "structure," "behavior," and, especially, "function" in engineering practice. Computers provide great help in...
B. Chandrasekaran, John R. Josephson
JMLR
2012
13 years 5 months ago
Structured Output Learning with High Order Loss Functions
Often when modeling structured domains, it is desirable to leverage information that is not naturally expressed as simply a label. Examples include knowledge about the evaluation ...
Daniel Tarlow, Richard S. Zemel
STOC
2004
ACM
117views Algorithms» more  STOC 2004»
16 years 3 months ago
New notions of security: achieving universal composability without trusted setup
We propose a modification to the framework of Universally Composable (UC) security [3]. Our new notion, involves comparing the protocol executions with an ideal execution involvin...
Manoj Prabhakaran, Amit Sahai
ISORC
2008
IEEE
15 years 9 months ago
MRBAC: Hierarchical Role Management and Security Access Control for Distributed Multimedia Systems
In this paper, a Role-based Access Control (RBAC) model is applied and extended to a multimedia version called Multi-Role Based Access Control (MRBAC), which can fully support the...
Na Zhao, Min Chen, Shu-Ching Chen, Mei-Ling Shyu