Sciweavers

1818 search results - page 60 / 364
» How users use access control
Sort
View
113
Voted
ICDCS
2006
IEEE
15 years 8 months ago
Fast data access over asymmetric channels using fair and secure bandwidth sharing
We propose a peer-to-peer architecture designed to overcome asymmetries in upload/download speeds that are typical in end-user dialup, broadband and cellular wireless Internet con...
Sachin Agarwal, Moshe Laifenfeld, Ari Trachtenberg...
114
Voted
WCNC
2008
IEEE
15 years 9 months ago
Performance Comparison of Uplink WLANs with Single-User and Multi-User MIMO Schemes
— In this paper, we compare the performance of wireless local area networks (WLANs) with single-user MIMO (SU-MIMO) and multi-user MIMO (MU-MIMO) in terms of collision probabilit...
Hu Jin, Bang Chul Jung, Ho Young Hwang, Dan Keun S...
108
Voted
MM
2003
ACM
131views Multimedia» more  MM 2003»
15 years 8 months ago
Enhancing web accessibility
This demonstration will illustrate the key technical and user interface aspects of the Web Adaptation Technology. Various transformations underlying the system will be shown that ...
Alison Lee, Vicki L. Hanson
101
Voted
HUC
2003
Springer
15 years 7 months ago
Is Context-Aware Computing Taking Control away from the User? Three Levels of Interactivity Examined
Abstract. Context-aware computing promises a smooth interaction between humans and technology but few studies have been conducted with regards to how autonomously an application sh...
Louise Barkhuus, Anind K. Dey
135
Voted
DARE
2000
146views more  DARE 2000»
15 years 4 months ago
WebStickers: using physical tokens to access, manage and share bookmarks to the Web
In the WebStickers system, where barcode stickers may be attached to physical objects making them act as bookmarks to the worldwide web in a convenient way to the user. Using read...
Peter Ljungstrand, Johan Redström, Lars Erik ...