Sciweavers

62 search results - page 4 / 13
» User Modeling for Telecommunication Applications: Experience...
Sort
View
HCI
2007
13 years 9 months ago
3D Modeling and Design Supported Via Interscopic Interaction Strategies
3D modeling applications are widely used in many application domains ranging from CAD to industrial or graphics design. Desktop environments have proven to be a powerful user inter...
Frank Steinicke, Timo Ropinski, Gerd Bruder, Klaus...
ESORICS
2007
Springer
14 years 1 months ago
SilentKnock: Practical, Provably Undetectable Authentication
Port knocking is a technique first introduced in the blackhat and trade literature to prevent attackers from discovering and exploiting potentially vulnerable services on a networ...
Eugene Y. Vasserman, Nicholas Hopper, John Laxson,...
IWPC
2003
IEEE
14 years 26 days ago
Observing and Measuring Cognitive Support: Steps Toward Systematic Tool Evaluation and Engineering
A key desideratum for many software comprehension tools is to reduce the mental burdens of software engineers. That is, the tools should support cognition. This key benefit is di...
Andrew Walenstein
ESCIENCE
2006
IEEE
13 years 9 months ago
Domain Based Access Control Model for Distributed Collaborative Applications
This paper describes the design and development of a flexible domain-based access control infrastructure for distributed Collaborative Environments. The paper proposes extensions ...
Yuri Demchenko, Cees de Laat, Leon Gommans, Ren&ea...
ICC
2007
IEEE
171views Communications» more  ICC 2007»
14 years 1 months ago
On the Performance of the AAA Systems in 3G Cellular Networks
— This paper analyzes the performance of a system architecture for the Authentication, Authorization, and Accounting (AAA), in a scenario where 3G users generate traffic and invo...
Said Zaghloul, Admela Jukan