Skip to main content

Dartmouth Digital Library Collections

You've searched:

All Collections
  • All fields: access-control
(7 results)



Display: 50

    • Secure context-sensitive authorization.

    • Secure context-sensitive authorization.
    • Computers -- Access control. ; Authentication. ; Ubiquitous computing.
    • Pervasive computing leads to an increased integration between the real world and the computational world, and many applications in pervasive computing adapt to the user's context, such as the location of the user and relevant devices, the presence...
    • Patient classification from fMRI brain activation patterns.

    • Patient classification from fMRI brain activation patterns.
    • Brain -- Magnetic resonance imaging. ; Brain mapping. Brain -- Localization of functions. ; Diagnostic imaging. ; Pattern perception. ; Patients -- Classification. ; Alzheimer's disease -- Diagnosis. ; Schizophrenia -- Diagnosis. ; Brain damage --...
    • Earlier work has suggested that various neurological or neuropsychiatric disorders may result in characteristic spatial patterns in brain activation, potentially allowing their detection from maps of brain activity under different conditions....
    • Naming and sharing resources across administrative boundaries.

    • Naming and sharing resources across administrative boundaries.
    • Electronic data processing -- Distributed processing. ; Computer network architectures. ; Programming languages (Electronic computers) -- Semantics. ; Database management.
    • I tackle the problem of naming and sharing resources across administrative boundaries. Conventional systems manifest the hierarchy of typical administrative structure in the structure of their own mechanism. While natural for communication that...
    • Agent Tcl: a flexible and secure mobile-agent system.

    • Agent Tcl: a flexible and secure mobile-agent system.
    • Intelligent agents (Computer software). ; Electronic data processing -- Distributed processing. ; Tcl (Computer program language). ; Computer networks -- Security measures.
    • A mobile agent is an autonomous program that can migrate under its own control from machine to machine in a heterogeneous network. In other words, the program can suspend its execution at an arbitrary point, transport itself to another machine, and...
    • Hardware-Assisted Secure Computation.

    • Hardware-Assisted Secure Computation.
    • Computer networks -- Security measures. Computer networks -- Access control. Computer network protocols.
    • The theory community has worked on Secure Multiparty Computation (SMC) for more than two decades, and has produced many protocols for many settings. One common thread in these works is that the protocols cannot use a Trusted Third Party (TTP), even...

QuickView

Display a larger image and more item information when the pointer pauses over a thumbnail
on off
 

Layout options:

Thumbnail with title
Grid with smaller thumbnails and more detail
Select the collections to add or remove from your search
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
 
OK