Sciweavers

708 search results - page 96 / 142
» Implementing access control to people location information
Sort
View
IPPS
2000
IEEE
14 years 3 days ago
Replicating the Contents of a WWW Multimedia Repository to Minimize Download Time
Dynamic replication algorithms aim at allocating, migrating and deleting copies of an object over various Internet hosts, according to the access patterns exhibited online, so as ...
Thanasis Loukopoulos, Ishfaq Ahmad
IEEEARES
2007
IEEE
14 years 2 months ago
CSP-Based Firewall Rule Set Diagnosis using Security Policies
The most important part of a firewall configuration process is the implementation of a security policy by a security administrator. However, this security policy is not designed b...
Sergio Pozo, Rafael Ceballos, Rafael M. Gasca
ECTEL
2009
Springer
14 years 2 months ago
Sharing Distributed Resources in LearnWeb2.0
Abstract. The success of recent Web 2.0 platforms shows that people share information and resources within their social community and beyond. The use of these platforms in an e-lea...
Fabian Abel, Ivana Marenzi, Wolfgang Nejdl, Sergej...
ICMI
2000
Springer
171views Biometrics» more  ICMI 2000»
13 years 11 months ago
Gaze and Speech in Attentive User Interfaces
The trend toward pervasive computing necessitates finding and implementing appropriate ways for users to interact with devices. We believe the future of interaction with pervasive ...
Paul P. Maglio, Teenie Matlock, Christopher S. Cam...
WSNA
2003
ACM
14 years 29 days ago
Proximity interactions between wireless sensors and their application
Many applications in ubiquitous computing rely on knowing where people and objects are relative to each other. By placing small wireless sensors on people, at specific locations, ...
Waylon Brunette, Carl Hartung, Ben Nordstrom, Gaet...