Sciweavers

1818 search results - page 160 / 364
» How users use access control
Sort
View
PERCOM
2010
ACM
14 years 1 months ago
Pervasive maps: Explore and interact with pervasive environments
—Efficient discovery of nearby devices and services is one of the preconditions to obtain a usable pervasive environment. Typical user interfaces in these environments hide the ...
Geert Vanderhulst, Kris Luyten, Karin Coninx
JCDL
2005
ACM
127views Education» more  JCDL 2005»
14 years 3 months ago
Assessing tools for use with webcasts
This research assessed the effectiveness of selected interface tools in helping people respond to classic information tasks with webcasts. Rather than focus on a classic search/br...
Elaine G. Toms, Christine Dufour, Jonathan Lewis, ...
DIM
2005
ACM
13 years 11 months ago
Pseudonym management using mediated identity-based cryptography
Mobile Location-Based Services (LBS) have raised privacy concerns amongst mobile phone users who may need to supply their identity and location information to untrustworthy third ...
Thibault Candebat, Cameron Ross Dunne, David T. Gr...
QOFIS
2000
Springer
14 years 1 months ago
Random Early Marking
In this paper we present an optimisation approach to congestion flow control. The initial context of this approach was as a rate based flow control in ATM networks. We describe te...
Sanjeewa Athuraliya, Steven H. Low, David E. Lapsl...
FGCS
2008
107views more  FGCS 2008»
13 years 9 months ago
Dynamic security context management in Grid-based applications
This paper summarises ongoing research and recent results on the development of flexible access control infrastructure for complex resource provisioning in Grid-based collaborativ...
Yuri Demchenko, Olle Mulmo, Leon Gommans, Cees de ...