Sciweavers

1818 search results - page 83 / 364
» How users use access control
Sort
View
ICC
1997
IEEE
155views Communications» more  ICC 1997»
14 years 1 months ago
Design of Call Control Signaling in Wireless ATM Networks
: In this paper, a multiservice, local-area, wireless access ATM system is explored from a signaling protocol viewpoint. The signaling architecture considered here follows the sign...
Nikolaos H. Loukas, Nikos I. Passas, Lazaros F. Me...
FTCS
1997
99views more  FTCS 1997»
13 years 10 months ago
Toward Accessibility Enhancement of Dependability Modeling Techniques and Tools
Fast turnaroundtime independabilityevaluation iscrucialfor e cient fault-tolerant system design and dependability of the resulting product since timely feedbacks will allow more i...
Ann T. Tai, Herbert Hecht, Kishor S. Trivedi, Bing...
UIST
2006
ACM
14 years 3 months ago
Phosphor: explaining transitions in the user interface using afterglow effects
Sometimes users fail to notice a change that just took place on their display. For example, the user may have accidentally deleted an icon or a remote collaborator may have change...
Patrick Baudisch, Desney S. Tan, Maxime Collomb, D...
MMB
2001
Springer
141views Communications» more  MMB 2001»
14 years 1 months ago
Performance Analysis of the Random Access Protocol in TETRAPOL Trunked Radio Networks
This paper provides a performance evaluation of the TETRAPOL random access protocol. The results are based on a Markovian model which is also presented. The Markovian model is use...
Dirk Kuypers, Peter Sievering
INFOCOM
2005
IEEE
14 years 2 months ago
Designing wireless radio access networks for third generation cellular networks
— In third generation (3G) cellular networks, base stations are connected to base station controllers by pointto-point (usually T1/E1) links. However, today’s T1/E1 based backh...
Tian Bu, Mun Choon Chan, Ramachandran Ramjee