Sciweavers

6137 search results - page 1154 / 1228
» Securing Collaborative Applications
Sort
View
INTERACT
2003
13 years 10 months ago
Proximal Interactions: A Direct Manipulation Technique for Wireless Networking
As a number of networked digital devices are ubiquitously used, control of inter-device communications becomes a complicated task. People can no longer keep track of all the device...
Jun Rekimoto, Yuji Ayatsuka, Michimune Kohno, Haru...
LISA
2003
13 years 10 months ago
Virtual Appliances for Deploying and Maintaining Software
This paper attempts to address the complexity of system administration by making the labor of applying software updates independent of the number of computers on which the softwar...
Constantine P. Sapuntzakis, David Brumley, Ramesh ...
AAAI
2000
13 years 10 months ago
Adaptive User Interfaces through Dynamic Design Automation
The inherent difficulty in supporting human usability in large control systems--such as building environmental and security systems--derives from the large diversity of components...
Robin R. Penner, Erik S. Steinmetz, Christopher L....
IRMA
2000
13 years 10 months ago
Remote control for videoconferencing
We have designed, implemented, and deployed a camera control system and a conference controller that provide remote control capabilities for videoconferencing over the Internet. T...
Marcia Perry, Deborah A. Agarwal
SEC
1996
13 years 10 months ago
Intention modelling: approximating computer user intentions for detection and prediction of intrusions
This paper introduces and describes an innovative modelling approach which utilises models that are synthesised through approximate calculations of user actions and extensive repr...
Thomas Spyrou, John Darzentas
« Prev « First page 1154 / 1228 Last » Next »