Sciweavers

1818 search results - page 127 / 364
» How users use access control
Sort
View
EDOC
2006
IEEE
14 years 3 months ago
Specifying and Controlling Multi-Channel Web Interfaces for Enterprise Applications
When building enterprise applications that need to be accessed through a variety of client devices, developers usually strive to implement most of the business logic device-indepen...
Matthias Book, Volker Gruhn
TEI
2012
ACM
225views Hardware» more  TEI 2012»
12 years 4 months ago
On-body interaction: armed and dangerous
Recent technological advances in input sensing, as well as ultra-small projectors, have opened up new opportunities for interaction – the use of the body itself as both an input...
Chris Harrison, Shilpa Ramamurthy, Scott E. Hudson
SIGCSE
2002
ACM
146views Education» more  SIGCSE 2002»
13 years 9 months ago
JDBC demonstration courseware using Servlets and Java Server Pages
This paper describes the design and functionality of courseware developed to demonstrate the JDBC API. The coursewarc is used in an advanced undergraduate database course that emp...
Suzanne W. Dietrich, Susan Darling Urban, Ion Kyri...
JISE
2008
151views more  JISE 2008»
13 years 9 months ago
Design of QoS and Admission Control for VoIP Services Over IEEE 802.11e WLANs
Supporting telephone services using wireless LAN as the access network is an important application nowadays. The SIP and IEEE 802.11e are the two most promising protocols to suppo...
Pei-Yeh Wu, Jen-Jee Chen, Yu-Chee Tseng, Hung-Wei ...
IMC
2009
ACM
14 years 3 months ago
Impact of transient CSMA/CA access delays on active bandwidth measurements
WLAN devices based on CSMA/CA access schemes have become a fundamental component of network deployments. In such wireless scenarios, traditional networking applications, tools, an...
Marc Portoles-Comeras, Albert Cabellos-Aparicio, J...