Sciweavers

1818 search results - page 152 / 364
» How users use access control
Sort
View
ICPADS
2005
IEEE
14 years 3 months ago
A Differentiated Message Delivery Architecture to Control Spam
Unsolicited bulk electronic mail (spam) is increasingly plaguing the Internet Email system and deteriorating its value as a convenient communication tools. In this paper we argue ...
Zhenhai Duan, Yingfei Dong, Kartik Gopalan
TWC
2008
112views more  TWC 2008»
13 years 9 months ago
Throughput Analysis of TCP-Friendly Rate Control in Mobile Hotspots
By integrating wireless wide area networks (WWANs) and wireless local area networks (WLANs), mobile hotspot technologies enable seamless Internet multimedia services to users on-bo...
Sangheon Pack, Xuemin Shen, Jon W. Mark, Lin Cai
CHI
2009
ACM
14 years 10 months ago
Timing is everything?: the effects of timing and placement of online privacy indicators
Many commerce websites post privacy policies to address Internet shoppers' privacy concerns. However, few users read or understand them. Iconic privacy indicators may make pr...
Serge Egelman, Janice Y. Tsai, Lorrie Faith Cranor...
MMSP
2008
IEEE
178views Multimedia» more  MMSP 2008»
14 years 4 months ago
Semantic saliency driven camera control for personal remote collaboration
—This paper presents a camera combo system for personal remote collaboration applications. The system consists of two different cameras. One camera has a wide field of view, and...
Cha Zhang, Zicheng Liu, Zhengyou Zhang, Qi Zhao
CAISE
2006
Springer
14 years 1 months ago
On Controlled Flexibility
Striking a balance between rigidity and flexibility is a central challenge in designing business processes. Striking this balance begins on the type level, because expressiveness ...
Signe Ellegård Borch, Christian Stefansen