Sciweavers

1818 search results - page 142 / 364
» How users use access control
Sort
View
JASIS
2006
164views more  JASIS 2006»
13 years 9 months ago
A study of interface support mechanisms for interactive information retrieval
Advances in search technology have meant that search systems can now offer assistance to users beyond simply retrieving a set of documents. For example, search systems are now cap...
Ryen W. White, Ian Ruthven
CSCW
2000
ACM
14 years 1 months ago
Designing presentations for on-demand viewing
Increasingly often, presentations are given before a live audience, while simultaneously being viewed remotely and recorded for subsequent viewing on-demand over the Web. How shou...
Liwei He, Jonathan Grudin, Anoop Gupta
CHI
2011
ACM
13 years 28 days ago
In the shadow of misperception: assistive technology use and social interactions
Few research studies focus on how the use of assistive technologies is affected by social interaction among people. We present an interview study of 20 individuals to determine ho...
Kristen Shinohara, Jacob O. Wobbrock
JSAC
2007
107views more  JSAC 2007»
13 years 9 months ago
Admission control in data transfers over lightpaths
—The availability of optical network infrastructure and appropriate user control software has recently made it possible for scientists to establish end-to-end circuits across mul...
Wojciech M. Golab, Raouf Boutaba
IAJIT
2010
133views more  IAJIT 2010»
13 years 7 months ago
Improving web services security models
: Web services are considered one of the main technologies which emerged in recent years, they provide an application integration technology that allows business applications to co...
Sawsan Abu-Taleb, Hossam Mustafa