Sciweavers

427 search results - page 8 / 86
» Policies: Giving Users Control over Calls
Sort
View
CSCW
1996
ACM
14 years 2 months ago
Policies and Roles in Collaborative Applications
Collaborative systems provide a rich but potentially chaotic environment for their users. This paper presents a system that allows users to control collaboration by enacting polic...
W. Keith Edwards
PLDI
2005
ACM
14 years 3 months ago
Composing security policies with polymer
We introduce a language and system that supports definition and composition of complex run-time security policies for Java applications. Our policies are comprised of two sorts o...
Lujo Bauer, Jay Ligatti, David Walker
JSAC
2008
254views more  JSAC 2008»
13 years 9 months ago
Cross-Layer Based Opportunistic MAC Protocols for QoS Provisionings Over Cognitive Radio Wireless Networks
We propose the cross-layer based opportunistic multi-channel medium access control (MAC) protocols, which integrate the spectrum sensing at physical (PHY) layer with the packet sch...
Hang Su, Xi Zhang
IWAN
2000
Springer
14 years 1 months ago
Two Rule-Based Building-Block Architectures for Policy-Based Network Control
Policy-based networks can be customized by users by injecting programs called policies into the network nodes. So if general-purpose functions can be specified in a policy-based ne...
Yasusi Kanada
CHI
2010
ACM
14 years 4 months ago
Cars, calls, and cognition: investigating driving and divided attention
Conversing on cell phones while driving an automobile is a common practice. We examine the interference of the cognitive load of conversational dialog with driving tasks, with the...
Shamsi T. Iqbal, Yun-Cheng Ju, Eric Horvitz