Sciweavers

797 search results - page 42 / 160
» Towards a Generalized Interaction Scheme for Information Acc...
Sort
View
SACMAT
2009
ACM
15 years 6 months ago
Analysis of virtual machine system policies
The recent emergence of mandatory access (MAC) enforcement for virtual machine monitors (VMMs) presents an opportunity to enforce a security goal over all its virtual machines (VM...
Sandra Rueda, Hayawardh Vijayakumar, Trent Jaeger
ASSETS
2009
ACM
15 years 6 months ago
Instant tactile-audio map: enabling access to digital maps for people with visual impairment
In this paper, we propose an automatic approach, complete with a prototype system, for supporting instant access to maps for local navigation by people with visual impairment. The...
Zheshen Wang, Baoxin Li, Terri Hedgpeth, Teresa Ha...
MM
2005
ACM
187views Multimedia» more  MM 2005»
15 years 5 months ago
Augmented segmentation and visualization for presentation videos
We investigate methods of segmenting, visualizing, and indexing presentation videos by both audio and visual data. The audio track is segmented by speaker, and augmented with key ...
Alexander Haubold, John R. Kender
CCS
2005
ACM
15 years 5 months ago
Preventing attribute information leakage in automated trust negotiation
Automated trust negotiation is an approach which establishes trust between strangers through the bilateral, iterative disclosure of digital credentials. Sensitive credentials are ...
Keith Irwin, Ting Yu
CIKM
2008
Springer
15 years 1 months ago
CE2: towards a large scale hybrid search engine with integrated ranking support
The Web contains a large amount of documents and increasingly, also semantic data in the form of RDF triples. Many of these triples are annotations that are associated with docume...
Haofen Wang, Thanh Tran, Chang Liu