Sciweavers

977 search results - page 93 / 196
» Soft Constraints for Security
Sort
View
CHI
2005
ACM
16 years 2 months ago
QueryLines: approximate query for visual browsing
We introduce approximate query techniques for searching and analyzing two-dimensional data sets such as line or scatter plots. Our techniques allow users to explore a dataset by d...
Kathy Ryall, Neal Lesh, Tom Lanning, Darren Leigh,...
PRDC
2005
IEEE
15 years 7 months ago
Server Protection through Dynamic Patching
Recently, hackers has been developing fast propagating worms exploiting vulnerabilities that had just been disclosed by security experts. Those attacks particularly expose servers...
Nicolas Loriant, Marc Ségura-Devillechaise,...
128
Voted
ISLPED
2003
ACM
197views Hardware» more  ISLPED 2003»
15 years 6 months ago
Analyzing the energy consumption of security protocols
Security is critical to a wide range of wireless data applications and services. While several security mechanisms and protocols have been developed in the context of the wired In...
Nachiketh R. Potlapally, Srivaths Ravi, Anand Ragh...
SACMAT
2009
ACM
15 years 8 months ago
Supporting RBAC with XACML+OWL
XACML does not natively support RBAC and even the specialized XACML profiles are not able to support many relevant constraints such as static and dynamic separation of duty. Exte...
Rodolfo Ferrini, Elisa Bertino
ICCV
2009
IEEE
3167views Computer Vision» more  ICCV 2009»
16 years 6 months ago
Tracking a Hand Manipulating an Object
We present a method for tracking a hand while it is interacting with an object. This setting is arguably the one where hand-tracking has most practical relevance, but poses signi...
Henning Hamer, Konrad Schindler, Esther Koller-Mei...