Sciweavers

3000 search results - page 126 / 600
» Accessing an Information System by Chatting
Sort
View
DIM
2009
ACM
14 years 1 months ago
Using identity credential usage logs to detect anomalous service accesses
For e-commerce companies providing online services, fraudulent access resulting from theft of identity credentials is a serious concern. Such online service providers deploy a var...
Daisuke Mashima, Mustaque Ahamad
BCSHCI
2008
13 years 10 months ago
Disclosing spoken culture: user interfaces for access to spoken word archives
Over the past century alone, millions of hours of audiovisual data have been collected with great potential for e.g., new creative productions, research and educational purposes. ...
Willemijn Heeren, Franciska de Jong
HCI
2009
13 years 7 months ago
The Evolution of a Web Accessibility Testing Protocol
In early 2007, the California State University (CSU) system initiated a program to make all information technology accessible to persons with disabilities; the authors were appoint...
Tom Jewett, Wayne Dick
TON
2012
11 years 11 months ago
Opportunistic Spectrum Access in Multiple-Primary-User Environments Under the Packet Collision Constraint
—Cognitive Radio (CR) technology has great potential to alleviate spectrum scarcity in wireless communications. It allows secondary users (SUs) to opportunistically access spectr...
Eric Jung, Xin Liu
LCN
2006
IEEE
14 years 3 months ago
On Access Point Selection in IEEE 802.11 Wireless Local Area Networks
In wireless local area networks often a station can potentially associate with more than one access point. Therefore, a relevant question is which access point to select “bestâ€...
Murad Abusubaih, James Gross, Sven Wiethölter...