Sciweavers

5722 search results - page 476 / 1145
» Security Function Interactions
Sort
View
CCS
2006
ACM
15 years 8 months ago
Safety and consistency in policy-based authorization systems
In trust negotiation and other distributed proving systems, networked entities cooperate to form proofs that are justified by collections of certified attributes. These attributes...
Adam J. Lee, Marianne Winslett
NIPS
2001
15 years 6 months ago
Multiagent Planning with Factored MDPs
We present a principled and efficient planning algorithm for cooperative multiagent dynamic systems. A striking feature of our method is that the coordination and communication be...
Carlos Guestrin, Daphne Koller, Ronald Parr
CHI
2008
ACM
16 years 5 months ago
The design of gaze behavior for embodied social interfaces
Non-verbal behavior, particularly gaze, is a crucial part of human communication. To interact with humans in a rich, natural way, social interfaces need to use this communicative ...
Bilge Mutlu
CHI
2004
ACM
16 years 5 months ago
Mouse and touchscreen selection in the upper and lower visual fields
Neuroanatomical evidence indicates the human eye's visual field can be functionally divided into two vertical hemifields, each specialized for specific functions. The upper v...
Barry A. Po, Brian D. Fisher, Kellogg S. Booth
TABLETOP
2007
IEEE
15 years 11 months ago
The TViews Table in the Home
The past several years of computer interaction research have shown an increasing interest in tabletops for shared user interactions through touch or tangible objects. Digital medi...
Ali Mazalek, Matthew Reynolds, Glorianna Davenport