Sciweavers

1818 search results - page 149 / 364
» How users use access control
Sort
View
IJHPCN
2008
75views more  IJHPCN 2008»
13 years 9 months ago
Enhancing GridFTP performance using intelligent gateways
: To improve throughput of grid data servers under heavy loads or under denial of service attacks, it is important to service requests differentially, giving preference to ongoing ...
Onur Demir, Michael R. Head, Kanad Ghose, Madhusud...
ICC
2007
IEEE
148views Communications» more  ICC 2007»
14 years 4 months ago
HSDPA Performance in Live Networks
—The first HSDPA (High-Speed Downlink Packet Access) networks have been recently deployed for operational use. We evaluate and compare live HSDPA operational network performance ...
Marko Jurvansuu, Jarmo Prokkola, Mikko Hanski, Pek...
CHI
2006
ACM
14 years 10 months ago
Prototyping retractable string-based interaction techniques for dual-display mobile devices
Accessing information on mobile and wearable devices often requires the user's visual attention, and the precise operation of virtual or physical widgets. However, these inte...
Chandra Narayanaswami, Gábor Blaskó,...
COLCOM
2007
IEEE
14 years 1 months ago
Transparent security for collaborative environments
Current collaborative tools are often not able to profit from existing systems for user management. It is therefore necessary for collaborative systems to administrate their users ...
Eva Hladká, Daniel Kouril, Michal Proch&aac...
MHCI
2005
Springer
14 years 3 months ago
GpsTunes: controlling navigation via audio feedback
We combine the functionality of a mobile Global Positioning System (GPS) with that of an MP3 player, implemented on a PocketPC, to produce a handheld system capable of guiding a u...
Steven Strachan, Parisa Eslambolchilar, Roderick M...