Sciweavers

1818 search results - page 159 / 364
» How users use access control
Sort
View
JSAC
2006
83views more  JSAC 2006»
13 years 9 months ago
Optimal ACK mechanisms of the IEEE 802.15.3 MAC for ultra-wideband systems
Ultra-wideband (UWB) transmission is an emerging wireless technology for future short-range indoor and outdoor multimedia applications. To coordinate the access to the wireless med...
Yang Xiao, Xuemin Shen, Hai Jiang
CISC
2005
Springer
109views Cryptology» more  CISC 2005»
14 years 3 months ago
Enforcing Email Addresses Privacy Using Tokens
We propose a system which allows users to monitor how their email addresses are used and how they spread over the Internet. This protects the privacy of the user and can reduce the...
Roman Schlegel, Serge Vaudenay
ICLP
1999
Springer
14 years 1 months ago
Concurrency in Prolog Using Threads and a Shared Database
Concurrency in Logic Programming has received much attention in the past. One problem with many proposals, when applied to Prolog, is that they involve large modifications to the...
Manuel Carro, Manuel V. Hermenegildo
OZCHI
2006
ACM
14 years 3 months ago
Question-based group authentication
There are various situations where a distinction needs to be made between group members and outsiders. For example, to protect students in chat groups from unpleasant incidents ca...
Ann Nosseir, Richard C. H. Connor, Karen Renaud
MIS
2005
Springer
158views Multimedia» more  MIS 2005»
14 years 3 months ago
Context-Based Management of Multimedia Documents in 3D Navigational Environments
Abstract. This work proposes an approach for managing multimedia information associated to 3D environments navigated by the user. The influence of context (location, user profile, ...
Fabio Pittarello