Sciweavers

1818 search results - page 19 / 364
» How users use access control
Sort
View
HCI
2007
13 years 10 months ago
Determining Accessibility Needs Through User Goals
Access to information remains a major challenge for people with disabilities. In this paper, an approximate model of how people access information is proposed. This model is prese...
Kevin Carey, Rosaria Gracia, Christopher Power, He...
WWW
2008
ACM
14 years 9 months ago
How people use the web on mobile devices
This paper describes a series of user studies on how people use the Web via mobile devices. The data primarily comes from contextual inquiries with 47 participants between 2004 an...
Yanqing Cui, Virpi Roto
WWW
2004
ACM
14 years 9 months ago
How to make a semantic web browser
Two important architectural choices underlie the success of the Web: numerous, independently operated servers speak a common protocol, and a single type of client--the Web browser...
D. A. Quan, R. Karger
ICICS
2004
Springer
14 years 2 months ago
Dynamic Access Control for Multi-privileged Group Communications
Abstract. Recently, there is an increase in the number of group communication applications which support multiple service groups of different access privileges. Traditional access...
Di Ma, Robert H. Deng, Yongdong Wu, Tieyan Li
LCN
2006
IEEE
14 years 3 months ago
The Internet Group Management Protocol with Access Control (IGMP-AC)
IP Multicast is best known for its bandwidth conservation and lower resource utilization. The classical model of multicast makes it difficult to permit access only to authorized ...
Salekul Islam, J. William Atwood