Sciweavers

596 search results - page 12 / 120
» Theories of Access Consciousness
Sort
View
CHI
2004
ACM
14 years 7 months ago
Pointing without a pointer
We present a method for performing selection tasks based on continuous control of multiple, competing agents who try to determine the user's intentions from their control beh...
John Williamson, Roderick Murray-Smith
GLOBECOM
2009
IEEE
14 years 2 months ago
Building Femtocell More Secure with Improved Proxy Signature
—Demand for the femtocell is largely credited to the surge in a more always best connected communication conscious public. 3GPP define new architecture and security requirement f...
Chan-Kyu Han, Hyoung-Kee Choi, In-Hwan Kim
EURONGI
2006
Springer
13 years 11 months ago
Framework for Resource Allocation in Heterogeneous Wireless Networks Using Game Theory
This is a framework for resource allocation in a heterogeneous system composed of various access networks, for instance Third Generation wireless networks (3G) and WLAN, in the pre...
Mariana Dirani, Tijani Chahed
DEON
2008
Springer
13 years 9 months ago
Variations in Access Control Logic
Abstract. In this paper we investigate the design space of access control logics. Specifically, we consider several possible axioms for the common operator says. Some of the axioms...
Martín Abadi
ITRUST
2005
Springer
14 years 26 days ago
Risk Models for Trust-Based Access Control(TBAC)
The importance of risk in trust-based systems is well established. This paper presents a novel model of risk and decision-making based on economic theory. Use of the model is illus...
Nathan Dimmock, Jean Bacon, David Ingram, Ken Mood...