Sciweavers

1818 search results - page 290 / 364
» How users use access control
Sort
View
FMLDO
1999
Springer
137views Database» more  FMLDO 1999»
14 years 2 months ago
Federated Transaction Management with Snapshot Isolation
Federated transaction management (also known as multidatabase transaction management in the literature) is needed to ensure the consistency of data that is distributed across mult...
Ralf Schenkel, Gerhard Weikum, Norbert Weiße...
CHI
2004
ACM
14 years 10 months ago
Safety-critical interaction: usability in incidents and accidents
Recent years have seen an increasing use of sophisticated interaction techniques in the field of command and control systems. The use of such techniques has been required in order...
Philippe A. Palanque, Floor Koornneef, Chris Johns...
ICC
2008
IEEE
122views Communications» more  ICC 2008»
14 years 4 months ago
Multi-Carrier Transmission with Limited Feedback: Power Loading over Sub-Channel Groups
— Feedback of channel state information (CSI) enables a multi-carrier transmitter to optimize the power allocation across sub-channels. We consider a single user feedback scheme ...
Manish Agarwal, Dongning Guo, Michael L. Honig
CGI
2001
IEEE
14 years 1 months ago
Paint By Relaxation
We use relaxation to produce painted imagery from images and video. An energy function is first specified; we then search for a painting with minimal energy. The appeal of this st...
Aaron Hertzmann
CHI
2007
ACM
14 years 10 months ago
Sabbath day home automation: "it's like mixing technology and religion"
We present a qualitative study of 20 American Orthodox Jewish families' use of home automation for religious purposes. These lead users offer insight into real-life, longterm...
Allison Woodruff, Sally Augustin, Brooke E. Foucau...