Sciweavers

1818 search results - page 191 / 364
» How users use access control
Sort
View
144
Voted
PCM
2004
Springer
118views Multimedia» more  PCM 2004»
15 years 10 months ago
Reach-Through-the-Screen: A New Metaphor for Remote Collaboration
For some years, our group at FX Palo Alto Laboratory has been developing technologies to support meeting recording, collaboration, and videoconferencing. This paper presents severa...
Jonathan Foote, Qiong Liu, Don Kimber, Patrick Chi...
128
Voted
CASCON
1996
154views Education» more  CASCON 1996»
15 years 6 months ago
Broadband application transport service and management
Multimedia applications using broadband networking technologies (for example, Asynchronous Transfer Mode) often require services not provided by standard transport layer middlewar...
Zhenjun Zhu, Gerald A. Winters, Patrick Martin, Hu...
BIOWIRE
2007
Springer
15 years 11 months ago
Coalition Games and Resource Allocation in Ad-Hoc Networks
In this paper we explore some of the connections between cooperative game theory and the utility maximization framework for routing and flow control in networks. Central to both a...
Richard J. Gibbens, Peter B. Key
143
Voted
WSC
1998
15 years 6 months ago
Interactive Implementation of Optimal Simulation Experiment Designs
An attractive feature of many simulation packages is their availability on desktop computers and their potential for allowing the user to run a simulation model under different co...
Russell C. H. Cheng, John D. Lamb
AINA
2007
IEEE
15 years 11 months ago
An Improved Approach to Secure Authentication and Signing
We know how to build secure systems but for security measures to be truly effective it is necessary to use keys which are far too large for people to commit to memory. The consequ...
David Argles, Alex Pease, Robert John Walters