Sciweavers

1818 search results - page 123 / 364
» How users use access control
Sort
View
CSCLP
2007
Springer
14 years 3 months ago
Preference-Based Problem Solving for Constraint Programming
Abstract. Combinatorial problems such as scheduling, resource allocation, and configuration have many attributes that can be subject of user preferences. Traditional optimization ...
Ulrich Junker
ETFA
2005
IEEE
14 years 2 months ago
A security architecture for data privacy and security
Data access and software exchange are often achieved over insecure networks such as the public Internet. System designers are therefore forced to be proactive with regard to verif...
Alfred C. Weaver
IFIP
1994
Springer
14 years 1 months ago
Exploring user interfaces to improve learning outcomes
The concept of information landscapes has been a constant theme in the development of interactive multimedia packages. For the interface and access to this information to be effec...
John G. Hedberg, Barry Harper, Christine Brown, Ro...
CHI
2009
ACM
14 years 9 months ago
The VoiceBot: a voice controlled robot arm
We present a system whereby the human voice may specify continuous control signals to manipulate a simulated 2D robotic arm and a real 3D robotic arm. Our goal is to move towards ...
Brandi House, Jonathan Malkin, Jeff Bilmes
TVCG
2012
171views Hardware» more  TVCG 2012»
11 years 11 months ago
Region-Based Line Field Design Using Harmonic Functions
—Field design has wide applications in graphics and visualization. One of the main challenges in field design has been how to provide users with both intuitive control over the d...
Chih-Yuan Yao, Ming-Te Chi, Tong-Yee Lee, Tao Ju