Sciweavers

596 search results - page 8 / 120
» Theories of Access Consciousness
Sort
View
ICMB
2005
IEEE
114views Business» more  ICMB 2005»
14 years 29 days ago
WLAN Communities and Internet Access Sharing: A Regulatory Overview
The widespread adoption of wireless LAN has paved the way for the emergence of a compelling alternative to cellular networks for obtaining Internet access on the move. This has ge...
Giovanni Camponovo, Davide Cerutti
IADIS
2003
13 years 8 months ago
Accessible and Usable Internet System Design
The social concept “fragmented group” – is disabling people because it does not provide access to products and services to an enormous segment. Nobody, if they consciously t...
Runa Jesmin
CODASPY
2012
12 years 3 months ago
Comparison-based encryption for fine-grained access control in clouds
Access control is one of the most important security mechanisms in cloud computing. However, there has been little work that explores various comparison-based constraints for regu...
Yan Zhu, Hongxin Hu, Gail-Joon Ahn, Mengyang Yu, H...
POPL
2012
ACM
12 years 2 months ago
Access permission contracts for scripting languages
The ideal software contract fully specifies the behavior of an operation. Often, in particular in the context of scripting languages, a full specification may be cumbersome to s...
Phillip Heidegger, Annette Bieniusa, Peter Thieman...
MM
2010
ACM
265views Multimedia» more  MM 2010»
13 years 7 months ago
Affective image classification using features inspired by psychology and art theory
Images can affect people on an emotional level. Since the emotions that arise in the viewer of an image are highly subjective, they are rarely indexed. However there are situation...
Jana Machajdik, Allan Hanbury