Sciweavers

1818 search results - page 65 / 364
» How users use access control
Sort
View
GLOBECOM
2007
IEEE
14 years 3 months ago
Diversity Multiplexing Tradeoff in Multiple Antenna Multiple Access Channels with Partial CSIT
Abstract— We derive a lower bound on the diversitymultiplexing tradeoff for multiple antenna multiple access channels using temporal power control (PC). We quantify the substanti...
Kaushik Josiam, Dinesh Rajan, Mandyam D. Srinath
UM
2001
Springer
14 years 1 months ago
Enhancing Embodied Intelligent Agents with Affective User Modelling
The objective of this research is the exploration how affective knowledge used in global controlling mechanisms for public information systems with lifelike presentation agents wil...
Patrick Gebhard
AAAI
2011
12 years 9 months ago
User-Controllable Learning of Location Privacy Policies With Gaussian Mixture Models
With smart-phones becoming increasingly commonplace, there has been a subsequent surge in applications that continuously track the location of users. However, serious privacy conc...
Justin Cranshaw, Jonathan Mugan, Norman M. Sadeh
ISMIR
2004
Springer
156views Music» more  ISMIR 2004»
14 years 2 months ago
Digital Music Interaction Concepts: A User Study
The popularity of digital music has recently rapidly increased. The widespread use on computers and portable players and its availability through the Internet have modified the in...
Fabio Vignoli
ICAIL
2007
ACM
14 years 29 days ago
How to capture, model, and verify the knowledge of legal, security, and privacy experts: a pattern-based approach
Laws set requirements that force organizations to assess the security and privacy of their IT systems and impose the adoption of the implementation of minimal precautionary securi...
Luca Compagna, Paul El Khoury, Fabio Massacci, Res...