Sciweavers

1818 search results - page 190 / 364
» How users use access control
Sort
View
145
Voted
CHI
1994
ACM
15 years 9 months ago
Using aggregation and dynamic queries for exploring large data sets
When working with large data sets, users perform three primary types of activities: data manipulation, data analysis, and data visualization. The data manipulation process involve...
Jade Goldstein, Steven F. Roth
CHI
2001
ACM
16 years 5 months ago
Beyond command knowledge: identifying and teaching strategic knowledge for using complex computer applications
Despite experience, many users do not make efficient use of complex computer applications. We argue that this is caused by a lack of strategic knowledge that is difficult to acqui...
Suresh K. Bhavnani, Frederick Reif, Bonnie E. John
160
Voted
ASM
2010
ASM
15 years 8 months ago
Starting B Specifications from Use Cases
The B method is one of the most used formal methods, when reactive systems is under question, due to good support for refinement. However, obtaining the formal model from requireme...
Thiago C. de Sousa, Aryldo G. Russo
SAINT
2006
IEEE
15 years 11 months ago
Fair Overload Handling Using Proof-of-Work Functions
Overload can reduce the overall performance of a computer system up to a point where the whole service might collapse. Thus, for example the load on a server must be controlled to...
Sebastian Golze, Gero Mühl
NOSSDAV
2009
Springer
15 years 11 months ago
Providing statistically guaranteed streaming quality for peer-to-peer live streaming
Most of the literature on peer-to-peer (P2P) live streaming focuses on how to provide best-effort streaming quality by efficiently using the system bandwidth; however, there is n...
Miao Wang, Lisong Xu, Byrav Ramamurthy