Sciweavers

1818 search results - page 196 / 364
» How users use access control
Sort
View
WEBI
2001
Springer
15 years 9 months ago
Knowledge-Based Validation, Aggregation, and Visualization of Meta-data: Analyzing a Web-Based Information System
As meta-data become of ever more importance to the Web, we will need to start managing such meta-data. We argue that there is a strong need for meta-data validation and aggregation...
Heiner Stuckenschmidt, Frank van Harmelen
CHI
1997
ACM
15 years 9 months ago
WorldBeat: Designing a Baton-Based Interface for an Interactive Music Exhibit
This paper presents the interface design of the WorldBeat system, an interactive exhibit about using computers in musical education, and as musical instruments. The system allows ...
Jan O. Borchers
JSAC
2008
254views more  JSAC 2008»
15 years 5 months ago
Cross-Layer Based Opportunistic MAC Protocols for QoS Provisionings Over Cognitive Radio Wireless Networks
We propose the cross-layer based opportunistic multi-channel medium access control (MAC) protocols, which integrate the spectrum sensing at physical (PHY) layer with the packet sch...
Hang Su, Xi Zhang
MUM
2009
ACM
190views Multimedia» more  MUM 2009»
15 years 11 months ago
Handy feedback: connecting smart meters with mobile phones
Reducing their energy consumption has become an important objective for many people. Consumption transparency and timely feedback are essential to support those who want to adjust...
Markus Weiss, Friedemann Mattern, Tobias Graml, Th...
HT
2005
ACM
15 years 10 months ago
Information visualization for an intrusion detection system
— Spatial hypertext was developed from studies of how humans deal with information overflow particularly in situations where data needed to be interpreted quickly. Intrusion det...
James Blustein, Ching-Lung Fu, Daniel L. Silver