Sciweavers

1818 search results - page 360 / 364
» How users use access control
Sort
View
ICDCS
2010
IEEE
13 years 11 months ago
B-SUB: A Practical Bloom-Filter-Based Publish-Subscribe System for Human Networks
—The adoption of portable wireless devices is rapidly rising. The demand for efficient communication protocols amongst these devices is pressing. In this paper, we present a con...
Yaxiong Zhao, Jie Wu
VR
2009
IEEE
172views Virtual Reality» more  VR 2009»
14 years 2 months ago
Measurement Protocols for Medium-Field Distance Perception in Large-Screen Immersive Displays
How do users of virtual environments perceive virtual space? Many experiments have explored this question, but most of these have used head-mounted immersive displays. This paper ...
Eric Klein, J. Edward Swan II, Gregory S. Schmidt,...
RIVF
2007
13 years 9 months ago
Stochastic routing in large grid-shaped quantum networks
— This paper investigates the problem of secret key transmissions for an arbitrary Alice-Bob pair in Quantum Key Distribution (QKD)-based networks. We develop a realistic QKDbase...
Cuong Le Quoc, Patrick Bellot, Akim Demaille
CSCW
2004
ACM
13 years 7 months ago
Small-Scale Classification Schemes: A Field Study of Requirements Engineering
Small-scale classification schemes are used extensively in the coordination of cooperative work. This study investigates the creation and use of a classification scheme for handlin...
Morten Hertzum
SIGSOFT
2005
ACM
14 years 8 months ago
Applying classification techniques to remotely-collected program execution data
There is an increasing interest in techniques that support measurement and analysis of fielded software systems. One of the main goals of these techniques is to better understand ...
Murali Haran, Alan F. Karr, Alessandro Orso, Adam ...