In this paper we show how historical data, such as existing domain-specific databases or access logs, can be used to guide user interface design. We show how we employed such data...
The use of mobile technologies for self services, and the inclusion of elderly and cognitively disabled users in the self-service society can be improved by the application of appr...
Many existing access controls use node filtering or querying rewriting techniques. These techniques require rather time-consuming processes such as parsing, labeling, pruning and/...
Access control software must be based on a security policy model. Flaws in them may come from a lack of precision or some incoherences in the policy model or from inconsistencies ...
Abstract—Traditionally, random access protocols have been designed and studied by assuming simple models for the physical layer. We introduce a reception model that incorporates ...