Sciweavers

3712 search results - page 554 / 743
» Role-Based Access Control
Sort
View
139
Voted
NETCOOP
2009
Springer
15 years 9 months ago
Probabilistic Analysis of Hierarchical Cluster Protocols for Wireless Sensor Networks
Wireless sensor networks are designed to extract data from the deployment environment and combine sensing, data processing and wireless communication to provide useful information ...
Ingemar Kaj
140
Voted
OTM
2009
Springer
15 years 9 months ago
Photo-Based User Interfaces: Picture It, Tag It, Use It
Pervasive environments can be hard to configure and interact with using handheld computing devices, due to the mismatch between physical and digital worlds. Usually, smart resourc...
Geert Vanderhulst, Kris Luyten, Karin Coninx
UM
2009
Springer
15 years 9 months ago
Evaluating Three Scrutability and Three Privacy User Privileges for a Scrutable User Modelling Infrastructure
This paper describes the evaluation of a Scrutable User Modelling Infrastructure. SUMI is intended to form a service to allow users to share their user models from social e-network...
Demetris Kyriacou, Hugh C. Davis, Thanassis Tiropa...
118
Voted
MM
2009
ACM
144views Multimedia» more  MM 2009»
15 years 9 months ago
Peer-assisted view-dependent progressive mesh streaming
Progressive mesh streaming is increasingly used in 3D networked applications, such as online games, virtual worlds, and digital museums. To scale such applications to a large numb...
Wei Cheng, Dan Liu, Wei Tsang Ooi
94
Voted
SOUPS
2009
ACM
15 years 9 months ago
Ubiquitous systems and the family: thoughts about the networked home
Developments in ubiquitous and pervasive computing herald a future in which computation is embedded into our daily lives. Such a vision raises important questions about how people...
Linda Little, Elizabeth Sillence, Pamela Briggs