Sciweavers

3712 search results - page 704 / 743
» Role-Based Access Control
Sort
View
RAID
2005
Springer
14 years 1 months ago
Sequence Number-Based MAC Address Spoof Detection
Abstract. The exponential growth in the deployment of IEEE 802.11based wireless LAN (WLAN) in enterprises and homes makes WLAN an attractive target for attackers. Attacks that expl...
Fanglu Guo, Tzi-cker Chiueh
WEBI
2005
Springer
14 years 1 months ago
Metadata Propagation in the Web Using Co-Citations
Given the large heterogeneity of the World Wide Web, using metadata on the search engines side seems to be a useful track for information retrieval. Though, because a manual quali...
Camille Prime-Claverie, Michel Beigbeder, Thierry ...
ASSETS
2004
ACM
14 years 1 months ago
Text entry from power wheelchairs: edgewrite for joysticks and touchpads
Power wheelchair joysticks have been used to control a mouse cursor on desktop computers, but they offer no integrated text entry solution, confining users to point-and-click or p...
Jacob O. Wobbrock, Brad A. Myers, Htet Htet Aung, ...
MOBIHOC
2004
ACM
14 years 1 months ago
On the behavior of communication links of a node in a multi-hop mobile environment
In this work, we develop an analytical framework to investigate the behavior of the communication links of a node in a random mobility environment. Analytical expressions characte...
Prince Samar, Stephen B. Wicker
PDC
2004
ACM
14 years 1 months ago
Participatory design in community computing contexts: tales from the field
As technology becomes more embedded in our daily lives, there is a great deal of hope about the use of information technology to achieve positive community outcomes like increasin...
Cecelia Merkel, Lu Xiao, Umer Farooq, Craig H. Gan...