Sciweavers

758 search results - page 52 / 152
» User Control over User Adaptation: A Case Study
Sort
View
QOFIS
2001
Springer
14 years 1 months ago
Constrained TCP-Friendly Congestion Control for Multimedia Communication
With the lack of admission control and resource reservation mechanisms in the Internet, overload situations can only be avoided by having the end systems deploying congestion cont...
Dorgham Sisalem, Adam Wolisz
CSREASAM
2006
13 years 10 months ago
Reinforcing Access Control Using Fuzzy Relation Equations
Current computer security systems are based on the premise that once a user presents valid credentials to the authentication system (e.g. valid ID and password), they are granted ...
Ali Berrached, André de Korvin
INFOCOM
2006
IEEE
14 years 2 months ago
Capacity of Wireless Data Networks with Intra- and Inter-Cell Mobility
— The performance of wireless data systems has been thoroughly studied in the context of a single base station. In the present paper we analyze networks with several interacting ...
Sem C. Borst, Alexandre Proutiére, Nidhi He...
CCS
2008
ACM
13 years 11 months ago
User-controllable learning of security and privacy policies
Studies have shown that users have great difficulty specifying their security and privacy policies in a variety of application domains. While machine learning techniques have succ...
Patrick Gage Kelley, Paul Hankes Drielsma, Norman ...
PUC
2007
173views more  PUC 2007»
13 years 8 months ago
Situated play in a tangible interface and adaptive audio museum guide
This paper explores the design issues of situated play within a museum through the study of a museum guide prototype that integrates a tangible interface, audio display, and adapti...
Ron Wakkary, Marek Hatala