Sciweavers

5722 search results - page 396 / 1145
» Security Function Interactions
Sort
View
VR
2002
IEEE
174views Virtual Reality» more  VR 2002»
15 years 3 months ago
Immersive and Interactive Exploration of Billion-Atom Systems
We have developed a visualization system, named Atomsviewer, to render a billion atoms from the results of a molecular dynamics simulation. This system uses a hierarchical view fr...
Ashish Sharma, Xinlian Liu, Paul Miller, Aiichiro ...
AAAI
2004
15 years 5 months ago
Intelligent Systems Demonstration: The Secure Wireless Agent Testbed (SWAT)
We will demonstrate the Secure Wireless Agent Testbed (SWAT), a unique facility developed at Drexel University to study integration, networking and information assurance for next-...
Gustave Anderson, Andrew Burnheimer, Vincent A. Ci...
CCS
2006
ACM
15 years 7 months ago
TCG inside?: a note on TPM specification compliance
The Trusted Computing Group (TCG) has addressed a new generation of computing platforms employing both supplemental hardware and software with the primary goal to improve the secu...
Ahmad-Reza Sadeghi, Marcel Selhorst, Christian St&...

Book
525views
16 years 12 months ago
Recent Advances in Face Recognition
"The main idea and the driver of further research in the area of face recognition are security applications and human-computer interaction. Face recognition represents an intu...
Kresimir Delac, Mislav Grgic and Marian Stewart Ba...
CSFW
2008
IEEE
15 years 10 months ago
An Authorization Logic With Explicit Time
We present an authorization logic that permits reasoning with explicit time. Following a proof-theoretic approach, we study the meta-theory of the logic, including cut elimination...
Henry DeYoung, Deepak Garg, Frank Pfenning