Sciweavers

436 search results - page 9 / 88
» Arguing for gaining access to information
Sort
View
CORR
2011
Springer
245views Education» more  CORR 2011»
14 years 6 months ago
Joint Distributed Access Point Selection and Power Allocation in Cognitive Radio Networks
Spectrum management has been identified as a crucial step towards enabling the technology of the cognitive radio network (CRN). Most of the current works dealing with spectrum ma...
Mingyi Hong, Alfredo Garcia, Jorge Alviar
W4A
2006
ACM
15 years 5 months ago
Mobile phones may be the right devices for supporting developing world accessibility, but is the WWW the right service delivery
In this paper we detail the synergies we have observed between the features and limitations of mobile phones, and the usability and accessibility requirements of rural developing ...
Tapan S. Parikh
GLOBECOM
2006
IEEE
15 years 5 months ago
A Distributed Opportunistic Access Scheme for OFDMA Systems
Abstract— In this paper, we propose a distributed opportunistic access scheme for uplink OFDMA systems. The sub-carriers are grouped into several sub-channels. Users access these...
Dandan Wang, Hlaing Minn, Naofal Al-Dhahir
ICDM
2002
IEEE
128views Data Mining» more  ICDM 2002»
15 years 4 months ago
Mining Online Users? Access Records for Web Business Intelligence
This paper discusses about how business intelligence on a website could be obtained from users’ access records instead of web logs of “hits”. Users’ access records are cap...
Simon Fong, Serena Chan
ISSA
2008
15 years 1 months ago
A User Centric Model for Online Identity and Access Management
The problem today is that users are expected to remember multiple user names and passwords for different domains when accessing the Internet. Identity management solutions seek to...
Matthew Deas, Stephen Flowerday