Sciweavers

1818 search results - page 28 / 364
» How users use access control
Sort
View
ADAPTIVE
2007
Springer
14 years 3 months ago
User Profiles for Personalized Information Access
Abstract. The amount of information available online is increasing exponentially. While this information is a valuable resource, its sheer volume limits its value. Many research pr...
Susan Gauch, Mirco Speretta, Aravind Chandramouli,...
ASSETS
2008
ACM
13 years 10 months ago
Investigating sighted users' browsing behaviour to assist web accessibility
The rapid advancement of World Wide Web (Web) technology and constant need for attractive Websites produce pages that hinder visually impaired users. We assert that understanding ...
Eleni Michailidou, Simon Harper, Sean Bechhofer
CHI
2011
ACM
13 years 17 days ago
Exploring reactive access control
As users store and share more digital content at home, access control becomes increasingly important. One promising approach for helping non-expert users create accurate access po...
Michelle L. Mazurek, Peter F. Klemperer, Richard S...
GLOBECOM
2009
IEEE
14 years 26 days ago
Evolutionary Games for Hybrid Additive White Gaussian Noise Multiple Access Control
Abstract-- In this paper, we propose an evolutionary gametheoretic framework for hybrid additive white Gaussian noise multiple access channels. We consider a communication system c...
Quanyan Zhu, Hamidou Tembine, Tamer Basar
ICARCV
2006
IEEE
230views Robotics» more  ICARCV 2006»
14 years 3 months ago
A Biometric Approach to Linux Login Access Control
— Login access control refers to securing the entry point to a computing system. The login system is responsible for this service and must provide a number of tasks, the main tas...
Adam J. Gandossi, Wanquan Liu, Ronny Tjahyadi