Sciweavers

1818 search results - page 333 / 364
» How users use access control
Sort
View
WSE
2002
IEEE
14 years 1 months ago
Laying the Foundation for Web Services over Legacy Systems
As the use of the World Wide Web becomes more pervasive within our society, businesses and institutions are required to migrate a wide range of services to the web. Difficulties a...
Janet Lavery, Cornelia Boldyreff, Bin Ling, Colin ...
CN
2007
167views more  CN 2007»
13 years 9 months ago
Association management for data dissemination over wireless mesh networks
To enable multimedia broadcasting services in mesh networks, it is critical to optimize the broadcast traffic load. Traditionally, users associate with access points (APs) with th...
Dongwook Lee, Gayathri Chandrasekaran, Mukundan Sr...
CE
2008
128views more  CE 2008»
13 years 9 months ago
Beyond threaded discussion: Representational guidance in asynchronous collaborative learning environments
Although most online learning environments are predominately text based, researchers have argued that representational support for the conceptual structure of a problem would addr...
Daniel D. Suthers, Ravi K. Vatrapu, Richard Medina...
JCS
1998
117views more  JCS 1998»
13 years 8 months ago
A Semantic-Based Transaction Processing Model for Multilevel Transactions
Multilevel transactions have been proposed for multilevel secure databases; in contrast to most proposals, such transactions allow users to read and write across multiple security...
Indrakshi Ray, Paul Ammann, Sushil Jajodia
ACSAC
2010
IEEE
13 years 7 months ago
Exploiting smart-phone USB connectivity for fun and profit
The Universal Serial Bus (USB) connection has become the de-facto standard for both charging and data transfers for smart phone devices including Google's Android and Apple&#...
Zhaohui Wang, Angelos Stavrou