Sciweavers

1818 search results - page 296 / 364
» How users use access control
Sort
View

Publication
194views
15 years 8 months ago
A Survey of Application Layer Techniques for Adaptive Streaming of Multimedia
The current Internet only supports best-effort traffic. New high-speed technologies such as ATM (asynchronous transfer mode), gigabit Ethernet, fast Ethernet, and frame relay, have...
Bobby Vandalore, Wu-chi Feng, Raj Jain, Sonia Fahm...
HRI
2009
ACM
14 years 5 months ago
An information pipeline model of human-robot interaction
This paper investigates the potential usefulness of viewing the system of human, robot, and environment as an “information pipeline” from environment to user and back again. I...
Kevin Gold
APSEC
2003
IEEE
14 years 3 months ago
An Extensible Framework for Collaborative Software Engineering
The size, complexity and duration of typical software engineering projects means that teams of developers will work on them. However, with the exception of version control systems...
Carl Cook, Neville Churcher
HICSS
2003
IEEE
129views Biometrics» more  HICSS 2003»
14 years 3 months ago
Towards an Ontology for e-Document Management in Public Administration - the Case of Schleswig-Holstein
An action research project in the state administration of Schleswig-Holstein (Germany) seeks to answer the following questions: How can we organize and present edocuments so that ...
Ralf Klischewski
GD
1995
Springer
14 years 1 months ago
Graph Folding: Extending Detail and Context Viewing into a Tool for Subgraph Comparisons
It is a di cult problem to display large, complex graphs in a manner which furthers comprehension. A useful approach is to expand selected sections foci of the graph revealing de...
M. Sheelagh T. Carpendale, David J. Cowperthwaite,...