Sciweavers

1818 search results - page 178 / 364
» How users use access control
Sort
View
CHI
2005
ACM
16 years 5 months ago
TRIBA: a cable television retrieval & awareness system
This paper discusses the design of a physical and digital system intended to allow for easy manipulation and interaction with the tremendous amount of options present in advanced ...
Michael Tseng, Jon Kolko
GLOBECOM
2010
IEEE
15 years 2 months ago
A Controlled Coalitional Game for Wireless Connection Sharing and Bandwidth Allocation in Mobile Social Networks
Mobile social networks have been introduced as a new efficient (i.e., minimize resource usage) and effective (i.e., maximize the number of target recipients) way to disseminate con...
Dusit Niyato, Zhu Han, Walid Saad, Are Hjør...
129
Voted
HICSS
2002
IEEE
99views Biometrics» more  HICSS 2002»
15 years 10 months ago
Privacy in Distributed Electronic Commerce
In recent years there has been a movement toward deployment of distributed approaches for electronic commerce. Intelligent software agents, for instance, may be instructed to act ...
Larry Korba
ISWC
1998
IEEE
15 years 9 months ago
A Wearable Spatial Conferencing Space
Wearable computers provide constant access to computing and communications resources. In this paper we describe how the computing power of wearables can be used to provide spatial...
Mark Billinghurst, Jerry Bowskill, M. Jessop, Jaso...
UIST
2006
ACM
15 years 11 months ago
SwingStates: adding state machines to the swing toolkit
This article describes SwingStates, a library that adds state machines to the Java Swing user interface toolkit. Unlike traditional approaches, which use callbacks or listeners to...
Caroline Appert, Michel Beaudouin-Lafon