Sciweavers

1818 search results - page 67 / 364
» How users use access control
Sort
View
CCS
2006
ACM
14 years 25 days ago
Application security support in the operating system kernel
Application security is typically coded in the application. In kernelSec, we are investigating mechanisms to implement application security in an operating system kernel. The mech...
Manigandan Radhakrishnan, Jon A. Solworth
UIST
2009
ACM
14 years 3 months ago
Changing how people view changes on the web
The Web is a dynamic information environment. Web content changes regularly and people revisit Web pages frequently. But the tools used to access the Web, including browsers and s...
Jaime Teevan, Susan T. Dumais, Daniel J. Liebling,...
OTM
2009
Springer
14 years 3 months ago
Photo-Based User Interfaces: Picture It, Tag It, Use It
Pervasive environments can be hard to configure and interact with using handheld computing devices, due to the mismatch between physical and digital worlds. Usually, smart resourc...
Geert Vanderhulst, Kris Luyten, Karin Coninx
GLOBECOM
2008
IEEE
14 years 3 months ago
A Distributed Multi-User MIMO MAC Protocol for Wireless Local Area Networks
— Multi-user multiple-input multiple-output (MIMO) systems have been emerging and attracting considerable attention recently for its potential to substantially improve system cap...
Lin X. Cai, Hangguan Shan, Weihua Zhuang, Xuemin S...
WWW
2006
ACM
14 years 9 months ago
Cat and mouse: content delivery tradeoffs in web access
Web pages include extraneous material that may be viewed as undesirable by a user. Increasingly many Web sites also require users to register to access either all or portions of t...
Balachander Krishnamurthy, Craig E. Wills