Sciweavers

1818 search results - page 76 / 364
» How users use access control
Sort
View
SPW
2004
Springer
14 years 2 months ago
One User, Many Hats; and, Sometimes, No Hat: Towards a Secure Yet Usable PDA
How can we design a PDA that is at the same time secure and usable? In current implementations the two properties are mutually exclusive. Because normal users find password entry ...
Frank Stajano
HCI
2007
13 years 10 months ago
Detailed Monitoring of User's Gaze and Interaction to Improve Future E-Learning
In this paper, we investigate how to use future interaction technologies to enhance learning technologies. We examine in detail how tracking the mouse pointer and observing the use...
Heiko Drewes, Richard Atterer, Albrecht Schmidt
SMC
2010
IEEE
124views Control Systems» more  SMC 2010»
13 years 7 months ago
SoftFacts: A top-k retrieval engine for ontology mediated access to relational databases
—We outline SoftFacts, an ontology mediated top-k information retrieval system over relational databases. An ontology layer is used to define (in terms of a OWL-QL like Semantic...
Umberto Straccia
ICC
2009
IEEE
129views Communications» more  ICC 2009»
14 years 3 months ago
Random Access Protocols for WLANs Based on Mechanism Design
— In wireless local area networks (WLANs), quality of service (QoS) can be provided by mapping applications with different requirements (e.g., delay and throughput) into one of t...
Man Hon Cheung, Amir Hamed Mohsenian Rad, Vincent ...
CHI
2003
ACM
14 years 9 months ago
MiTAP for real users, real data, real problems
The MiTAP system was developed as an experimental prototype using human language technologies for monitoring disease outbreaks. The system provides timely, multi-lingual, global i...
Laurie E. Damianos, Steve Wohlever, Robyn Kozierok...