Sciweavers

1818 search results - page 126 / 364
» How users use access control
Sort
View
GECCO
2009
Springer
145views Optimization» more  GECCO 2009»
14 years 1 months ago
Investigating and exploiting the bias of the weighted hypervolume to articulate user preferences
Optimizing the hypervolume indicator within evolutionary multiobjective optimizers has become popular in the last years. Recently, the indicator has been generalized to the weight...
Anne Auger, Johannes Bader, Dimo Brockhoff, Eckart...
PCI
2001
Springer
14 years 1 months ago
A Knowledge Based Approach on Educational Metadata Use
One of the most rapidly evolving e-services is e-Learning, that is, the creation of advanced educational resources that are accessible on-line and, potentially, offer numerous adva...
Fotis Kokkoras, Demetrios G. Sampson, Ioannis P. V...
DBSEC
2000
153views Database» more  DBSEC 2000»
13 years 10 months ago
Protecting Privacy from Continuous High-resolution Satellite Surveillance
Privacy refers to controlling the dissemination and use of personal data, including information that is knowingly disclosed, as well as data that are unintentionally revealed as a ...
Soon Ae Chun, Vijayalakshmi Atluri
JCDL
2006
ACM
99views Education» more  JCDL 2006»
14 years 3 months ago
Using resources across educational digital libraries
This article reports on analyses of usage and design activities by users of the Instructional Architect (IA), an end-user authoring tool designed to support easy access to and use...
Mimi Recker, Bart Palmer
ICDCSW
2003
IEEE
14 years 2 months ago
Adaptive Power Control and Selective Radio Activation for Low-Power Infrastructure-Mode 802.11 LANs
We present an integrated dual approach to reduce power consumption in infrastructure-mode 802.11 wireless LANs. A novel distributed power control algorithm adaptively adjusts the ...
Anmol Sheth, Richard Han