Sciweavers

1818 search results - page 70 / 364
» How users use access control
Sort
View
EGOV
2004
Springer
14 years 2 months ago
Initial Experiments on the Effectiveness of Telephone Access to Government Services
We report on research aimed at gaining an improved understanding of how issues such as language, literacy and previous exposure to technology affect citizens’ ability to access g...
Laurens Cloete, Etienne Barnard, Hina Patel
IEAAIE
2003
Springer
14 years 2 months ago
UMAS Learning Requirement for Controlling Network Resources
- This paper presents an intelligent User Manager Agent System (UMAS) in which it has a capability of making a management decision for balancing the network load with the users’ ...
Abdullah Gani, Nasser Abouzakhar, Gordon A. Manson
AINA
2005
IEEE
14 years 2 months ago
An Efficient Hierarchical Key Management Scheme Using Symmetric Encryptions
The concept of hierarchical access control is that a higher privileged user (or higher level) has the ability to access data in lower privileged user (or lower level). Hierarchica...
Chu-Hsing Lin, Wei Lee, Yi-Kang Ho
WWW
2009
ACM
14 years 9 months ago
How opinions are received by online communities: a case study on amazon.com helpfulness votes
There are many on-line settings in which users publicly express opinions. A number of these offer mechanisms for other users to evaluate these opinions; a canonical example is Ama...
Cristian Danescu-Niculescu-Mizil, Gueorgi Kossinet...
MM
2004
ACM
100views Multimedia» more  MM 2004»
14 years 2 months ago
GURU: a multimedia distance-learning framework for users with disabilities
GURU is a distance-learning environment that renders multimedia information to users with disabilities in an accessible manner. It is an implementation framework developed as part...
Vidhya Balasubramanian, Nalini Venkatasubramanian