Sciweavers

1818 search results - page 15 / 364
» How users use access control
Sort
View
CHI
2009
ACM
14 years 8 months ago
Fighting for control: children's embodied interactions when using physical and digital representations
Tabletop and tangible interfaces are often described in terms of their support for shared access to digital resources. However, it is not always the case that collaborators want t...
Paul Marshall, Rowanne Fleck, Amanda Harris, Joche...
COMPSAC
2006
IEEE
14 years 1 months ago
A Pattern-Based Technique for Developing UML Models of Access Control Systems
This paper describes a pattern-based technique for systematic development of UML models of secure systems using access control. Access control is viewed and specified as a design...
Dae-Kyoo Kim, Priya Gokhale
VTC
2008
IEEE
185views Communications» more  VTC 2008»
14 years 2 months ago
Opportunistic Spectrum Access for Energy-Constrained Cognitive Radios
This paper considers a scenario in which a secondary user makes opportunistic use of a channel allocated to some primary network. The primary network operates in a time-slotted ma...
Anh Tuan Hoang, Ying-Chang Liang, David Tung Chong...
ASSETS
2005
ACM
13 years 9 months ago
How to operate a PC without using the hands
A demo of a biosignal interface, which allows to operate a Windows r PC without using the hands, shall be given. The system – called HaMCoS (for Hands-free Mouse Control System)...
Torsten Felzer, Rainer Nordmann
ACSAC
2000
IEEE
14 years 5 days ago
Implementing Security Policies using the Safe Areas of Computation Approach
The World Wide Web is playing a major role in reducing business costs and in providing convenience to users. Digital Libraries capitalize on this technology to distribute document...
André L. M. dos Santos, Richard A. Kemmerer