Sciweavers

5722 search results - page 505 / 1145
» Security Function Interactions
Sort
View
APCHI
2004
IEEE
15 years 8 months ago
Real-World Oriented Access Control Method with a Displayed Password
Abstract. Access control within a ubiquitous networking environment is a critical issue. Traditional access control methods have mainly relied on the authentication of registered u...
Yuji Ayatsuka, Michimune Kohno, Jun Rekimoto
IFIP
2009
Springer
15 years 2 months ago
A User Interface for a Game-Based Protocol Verification Tool
We present a platform that allows a protocol researcher to specify the sequence of games from an initial protocol to a protocol where the security property under consideration can ...
Peeter Laud, Ilja Tsahhirov
CVPR
2012
IEEE
13 years 7 months ago
Max-margin early event detectors
The need for early detection of temporal events from sequential data arises in a wide spectrum of applications ranging from human-robot interaction to video security. While tempor...
Minh Hoai Nguyen, Fernando De la Torre
DSD
2006
IEEE
113views Hardware» more  DSD 2006»
15 years 11 months ago
Lifetime Analysis in Heterogeneous Sensor Networks
Wireless sensor networks (WSN) are composed of battery-driven communication entities performing multiple, usually different tasks. In order to complete a given task, all sensor no...
Falko Dressler, Isabel Dietrich
BMCBI
2010
127views more  BMCBI 2010»
15 years 5 months ago
PeptideMine - A webserver for the design of peptides for protein-peptide binding studies derived from protein-protein interactom
Background: Signal transduction events often involve transient, yet specific, interactions between structurally conserved protein domains and polypeptide sequences in target prote...
Khader Shameer, Lalima L. Madan, Shivamurthy Veera...