Sciweavers

1818 search results - page 114 / 364
» How users use access control
Sort
View
INTERACT
2003
13 years 10 months ago
Programmorphosis: a Knowledge-Based Approach to End-User Programming
: Whereas sophisticated computer users can exercise more control in what they are exposed to and produce computational artifacts, technologically challenged end-users assume a more...
Andri Ioannidou
IEAAIE
2010
Springer
13 years 7 months ago
Learning User Preferences to Maximise Occupant Comfort in Office Buildings
It is desirable to ensure that the thermal comfort conditions in offices are in line with the preferences of occupants. Controlling their offices correctly therefore requires the c...
Anika Schumann, Nic Wilson, Mateo Burillo
WWW
2006
ACM
14 years 3 months ago
Integrating semantic web and language technologies to improve the online public administrations services
In this paper, we describe how domain ontologies are used in a dialogue system guiding the user to access web public administration contents. The current implementation of the sys...
Marta Gatius, Meritxell González, Sheyla Militell...
ICC
2009
IEEE
134views Communications» more  ICC 2009»
14 years 4 months ago
Voice Service Support over Cognitive Radio Networks
—In this paper, quality of service (QoS) provisioning for voice service over cognitive radio networks is considered. As voice traffic is sensitive to delay, the presence of prim...
Ping Wang, Dusit Niyato, Hai Jiang
IPPS
2008
IEEE
14 years 3 months ago
Scalable server provisioning with HOP-SCOTCH
The problem of provisioning servers in a cluster infrastructure includes the issues of coordinating access and sharing of physical resources, loading servers with the appropriate ...
David Daly, M. A. Silva, José E. Moreira