Sciweavers

3000 search results - page 110 / 600
» Accessing an Information System by Chatting
Sort
View
IJNSEC
2010
145views more  IJNSEC 2010»
13 years 4 months ago
Formal Specification of Common Criteria Based Access Control Policy Model
One of the major threats that an enterprise Information system networks are facing today is the Insider threat. As part of the Insider Threat study, lack of an effective access co...
Manpreet Singh, Manjeet S. Patterh
CHI
1995
ACM
14 years 21 days ago
Pad++: a zoomable graphical interface system
Large information spaces are often difficult to access efficiently and intuitively. We are exploring Pad++, a graphical interface system based on zooming, as an alternative to tra...
Benjamin B. Bederson, James D. Hollan
PERCOM
2007
ACM
14 years 8 months ago
Middleware for Secure Home Access and Control
User adaptive systems in the context of pervasive computing can only unveil their power if based on a generic middleware managing private data and context information in combinati...
Andrés Marín López, Wolfgang ...
IPPS
2005
IEEE
14 years 2 months ago
Automated Analysis of Memory Access Behavior
Abstract— We developed an automated environment to measure the memory access behavior of applications on high performance clusters. Code optimization for processor caches is cruc...
Michael Gerndt, Tianchao Li
MM
2003
ACM
131views Multimedia» more  MM 2003»
14 years 2 months ago
Enhancing web accessibility
This demonstration will illustrate the key technical and user interface aspects of the Web Adaptation Technology. Various transformations underlying the system will be shown that ...
Alison Lee, Vicki L. Hanson