Sciweavers

975 search results - page 160 / 195
» A hotel information system implementation using MAS technolo...
Sort
View
CHI
2007
ACM
16 years 2 months ago
Tracking the interaction of users with ajax applications for usability testing
In this paper, we introduce an implementation for detailed monitoring of user actions on web pages. It addresses the problem that the log data recorded by standard web servers is ...
Richard Atterer, Albrecht Schmidt
ISW
2005
Springer
15 years 7 months ago
Evaluating Access Control Policies Through Model Checking
We present a model-checking algorithm which can be used to evaluate access control policies, and a tool which implements it. The evaluation includes not only assessing whether the ...
Nan Zhang 0003, Mark Ryan, Dimitar P. Guelev
ICTAI
1999
IEEE
15 years 6 months ago
Dynamic Email Organization via Relevance Categories
Many researchers have proposed classification systems that automatically classify email in order to reduce information overload. However, none of these systems are in use today. T...
Kenrick J. Mock
LISA
2001
15 years 3 months ago
ScanSSH: Scanning the Internet for SSH Servers
SSH is a widely used application that provides secure remote login. It uses strong cryptography to provide authentication and confidentiality. The IETF SecSH working group is deve...
Niels Provos, Peter Honeyman
CAD
2010
Springer
15 years 2 months ago
AR interfacing with prototype 3D applications based on user-centered interactivity
Augmented Reality (AR) has been acclaimed as one of the promising technologies for advancing future UbiComp (Ubiquitous Computing) environments. Despite a myriad of AR application...
Seungjun Kim, Anind K. Dey