Sciweavers

1818 search results - page 199 / 364
» How users use access control
Sort
View
BTW
2007
Springer
245views Database» more  BTW 2007»
15 years 11 months ago
From Personal Desktops to Personal Dataspaces: A Report on Building the iMeMex Personal Dataspace Management System
Abstract: We propose a new system that is able to handle the entire Personal Dataspace of a user. A Personal Dataspace includes all data pertaining to a user on all his disks and o...
Jens-Peter Dittrich, Lukas Blunschi, Markus Fä...
DCOSS
2010
Springer
15 years 9 months ago
Time-Critical Data Delivery in Wireless Sensor Networks
A number of wireless sensor network (WSN) applications demand timely data delivery. However, existing WSNs are designed to conserve energy and not to support timely data transmissi...
Petcharat Suriyachai, James Brown, Utz Roedig
TEI
2009
ACM
172views Hardware» more  TEI 2009»
15 years 11 months ago
SLAPbook: tangible widgets on multi-touch tables in groupware environments
We present SLAPbook, an application using SLAP, translucent and tangible widgets for use on vision-based multi-touch tabletops in Single Display Groupware (SDG) environments. SLAP...
Malte Weiss, Julie Wagner, Roger Jennings, Yvonne ...
BCSHCI
2008
15 years 6 months ago
Evaluating driver attention and driving behaviour: comparing controlled driving and simulated driving
Emerging in-vehicle systems have turned the contemporary car into a human-computer interaction context that has its own set of rules and challenges. Interacting with in-vehicle sy...
Kenneth Majlund Bach, Mads Gregers Jæger, Mi...
SACMAT
2010
ACM
15 years 3 months ago
Role mining based on weights
Role mining from the existing permissions has been widely applied to aid the process of migrating to an RBAC system. While all permissions are treated evenly in previous approache...
Xiaopu Ma, Ruixuan Li, Zhengding Lu