Sciweavers

1818 search results - page 107 / 364
» How users use access control
Sort
View
TLT
2008
92views more  TLT 2008»
13 years 7 months ago
Lifelong Learner Modeling for Lifelong Personalized Pervasive Learning
Pervasive and ubiquitous computing has the potential to make huge changes in the ways that we will learn throughout our lives. This paper presents a vision for the lifelong user mo...
Judy Kay
ICAS
2008
IEEE
181views Robotics» more  ICAS 2008»
14 years 3 months ago
Modeling User Interfaces to Workflow Information Systems
This paper addresses the need for designing user interfaces (UIs) to workflow information systems by adopting a model-centric approach. We introduce a conceptual workflow model to...
Josefina Guerrero García, Jean Vanderdonckt...
WCNC
2010
IEEE
14 years 1 months ago
Global Grassroots WiFi Sharing
— Access point sharing communities are an attractive solution for low-cost global mobile Internet access. However, existing communities all require a central authority in form of...
Wolfgang Kieß, Till Elsner, Björn Scheu...
DBSEC
2010
196views Database» more  DBSEC 2010»
13 years 6 months ago
Preserving Integrity and Confidentiality of a Directed Acyclic Graph Model of Provenance
Abstract. This paper describes how to preserve integrity and confidentiality of a directed acyclic graph (DAG) model of provenance database. We show a method to preserve integrity ...
Amril Syalim, Takashi Nishide, Kouichi Sakurai
WOWMOM
2006
ACM
158views Multimedia» more  WOWMOM 2006»
14 years 3 months ago
Resource Control for the EDCA Mechanism in Multi-Rate IEEE 802.11e Networks
We investigate the problem of efficient resource control for elastic traffic in IEEE 802.11e’s Enhanced Distributed Channel Access (EDCA) mechanism. Our approach considers an ...
Vasilios A. Siris, Costas Courcoubetis