Sciweavers

1818 search results - page 60 / 364
» How users use access control
Sort
View
ICDCS
2006
IEEE
14 years 3 months ago
Fast data access over asymmetric channels using fair and secure bandwidth sharing
We propose a peer-to-peer architecture designed to overcome asymmetries in upload/download speeds that are typical in end-user dialup, broadband and cellular wireless Internet con...
Sachin Agarwal, Moshe Laifenfeld, Ari Trachtenberg...
WCNC
2008
IEEE
14 years 3 months ago
Performance Comparison of Uplink WLANs with Single-User and Multi-User MIMO Schemes
— In this paper, we compare the performance of wireless local area networks (WLANs) with single-user MIMO (SU-MIMO) and multi-user MIMO (MU-MIMO) in terms of collision probabilit...
Hu Jin, Bang Chul Jung, Ho Young Hwang, Dan Keun S...
MM
2003
ACM
131views Multimedia» more  MM 2003»
14 years 2 months ago
Enhancing web accessibility
This demonstration will illustrate the key technical and user interface aspects of the Web Adaptation Technology. Various transformations underlying the system will be shown that ...
Alison Lee, Vicki L. Hanson
HUC
2003
Springer
14 years 2 months ago
Is Context-Aware Computing Taking Control away from the User? Three Levels of Interactivity Examined
Abstract. Context-aware computing promises a smooth interaction between humans and technology but few studies have been conducted with regards to how autonomously an application sh...
Louise Barkhuus, Anind K. Dey
DARE
2000
146views more  DARE 2000»
13 years 10 months ago
WebStickers: using physical tokens to access, manage and share bookmarks to the Web
In the WebStickers system, where barcode stickers may be attached to physical objects making them act as bookmarks to the worldwide web in a convenient way to the user. Using read...
Peter Ljungstrand, Johan Redström, Lars Erik ...