Sciweavers

1627 search results - page 92 / 326
» On context in authorization policy
Sort
View
OZCHI
2006
ACM
14 years 3 months ago
Holding hands over a distance: technology probes in an intimate, mobile context
While apart, couples can verbally and visually communicate through existing technologies such as mobile phones, text messaging, videoconferencing and email. Yet, other important m...
Shannon O'Brien, Florian Mueller
CHI
2004
ACM
14 years 3 months ago
Focus+Context sketching on a pocket PC
Current Personal Digital Assistants (PDAs) such as Pocket PCs provide little support for sketching. This is due, no doubt, to the limited screen size and relatively poor resolutio...
Edward Lank, Son Phan
WIOPT
2006
IEEE
14 years 3 months ago
Fairness and throughput guarantees with maximal scheduling in multi-hop wireless networks
Abstract— We investigate the fairness and throughput properties of a simple distributed scheduling policy, maximal scheduling, in the context of a general ad-hoc wireless network...
Saswati Sarkar, Prasanna Chaporkar, Koushik Kar
ISI
2008
Springer
13 years 9 months ago
Using "Cited by" Information to Find the Context of Research Papers
This paper proposes a novel method of analyzing data to find important information about the context of research papers. The proposed CCTVA (Collecting, Cleaning, Translating, Visu...
Chun-Hung Lu, Chih-Chien Wang, Min-Yuh Day, Chorng...
IFIP
2004
Springer
14 years 3 months ago
Discretionary Overriding of Access Control in the Privilege Calculus
We extend a particular access control framework, the Privilege Calculus, with a possibility to override denied access for increased flexibility in hard to define or unanticipated...
Erik Rissanen, Babak Sadighi Firozabadi, Marek J. ...