Sciweavers

1818 search results - page 73 / 364
» How users use access control
Sort
View
HCI
2009
13 years 6 months ago
Webjig: An Automated User Data Collection System for Website Usability Evaluation
In order to improve website usability, it is important for developers to understand how users access websites. In this paper, we present Webjig, which is a support system for websi...
Mikio Kiura, Masao Ohira, Ken-ichi Matsumoto
ACSAC
2000
IEEE
14 years 1 months ago
Less Harm, Less Worry or How to Improve Network Security by Bounding System Offensiveness
In this paper we describe a new class of tools for protecting computer systems from security attacks. Their distinguished feature is the principle they are based on. Host or netwo...
Danilo Bruschi, Lorenzo Cavallaro, Emilia Rosti
IJDSST
2010
163views more  IJDSST 2010»
13 years 6 months ago
User's Behaviour inside a Digital Library
Abstract: CASPUR allows many academic Italian institutions located in the CentreSouth of Italy to access more than 7 million of articles through a digital library platform. We anal...
Marco Scarnò
PC
2002
114views Management» more  PC 2002»
13 years 8 months ago
Optimizing noncontiguous accesses in MPI-IO
The I/O access patterns of many parallel applications consist of accesses to a large number of small, noncontiguous pieces of data. If an application's I/O needs are met by m...
Rajeev Thakur, William Gropp, Ewing L. Lusk
MOBICOM
1999
ACM
14 years 1 months ago
An Architecture for a Secure Service Discovery Service
The widespread deployment of inexpensive communications technology, computational resources in the networking infrastructure, and network-enabled end devices poses an interesting ...
Steven E. Czerwinski, Ben Y. Zhao, Todd D. Hodes, ...