Sciweavers

2655 search results - page 136 / 531
» Event Systems and Access Control
Sort
View
IPPS
2006
IEEE
15 years 11 months ago
A performance model for fine-grain accesses in UPC
UPC’s implicit communication and fine-grain programming style make application performance modeling a challenging task. The correspondence between remote references and communi...
Zhang Zhang, S. R. Seidel
TSE
1998
96views more  TSE 1998»
15 years 4 months ago
The Use of Cooperation Scenarios in the Design and Evaluation of a CSCW System
—Design and evaluation of groupware systems raise questions which do not have to be addressed in the context of single user systems. The designer has to take into account not onl...
Oliver Stiemerling, Armin B. Cremers
124
Voted
FGR
2004
IEEE
97views Biometrics» more  FGR 2004»
15 years 8 months ago
Recognizing Song-Based Blink Patterns: Applications for Restricted and Universal Access
We introduce a novel system for recognizing patterns of eye blinks for use in assistive technology interfaces and security systems. First, we present a blink-based interface for c...
Tracy L. Westeyn, Thad Starner
185
Voted
SPC
2005
Springer
15 years 10 months ago
Supporting Dynamically Changing Authorizations in Pervasive Communication Systems
In pervasive computing environments, changes in context may trigger changes in an individual’s access permissions. We contend that existing access control frameworks do not provi...
Adam J. Lee, Jodie P. Boyer, Chris Drexelius, Pras...
ICSE
2009
IEEE-ACM
15 years 11 months ago
Mining recurrent activities: Fourier analysis of change events
Within the field of software repository mining, it is common practice to extract change-events from source control systems and then abstract these events to allow for different a...
Abram Hindle, Michael W. Godfrey, Richard C. Holt