Sciweavers

1818 search results - page 205 / 364
» How users use access control
Sort
View
SOUPS
2005
ACM
15 years 10 months ago
Usable security and privacy: a case study of developing privacy management tools
Privacy is a concept which received relatively little attention during the rapid growth and spread of information technology through the 1980’s and 1990’s. Design to make info...
Carolyn Brodie, Clare-Marie Karat, John Karat, Jin...
COST
1994
Springer
159views Multimedia» more  COST 1994»
15 years 9 months ago
A Mail-Based Teleservice Architecture for Archiving and Retrieving Dynamically Composable Multimedia Documents
In this paper, a teleservice for archiving and retrieving multimedia documents using public networks is described. This teleservice encourages a broad range of commercially applic...
Heiko Thimm, Katja Röhr, Thomas C. Rakow
CHI
2009
ACM
16 years 5 months ago
Reflections of everyday activities in spending data
In this paper we show that financial information can be used to sense many aspects of human activity. This simple technique gives people information about their daily lives, is ea...
Julia Schwarz, Jennifer Mankoff, H. Scott Matthews
ICC
2008
IEEE
162views Communications» more  ICC 2008»
15 years 11 months ago
Distributed Opportunistic Scheduling in Multihop Wireless Ad Hoc Networks
Abstract—In this paper, we introduce a framework for distributed opportunistic scheduling in multihop wireless ad hoc networks. With the proposed framework, one can take a schedu...
Yijiang Sun, Victor O. K. Li, Ka-Cheong Leung
HICSS
2006
IEEE
77views Biometrics» more  HICSS 2006»
15 years 11 months ago
System-Wide Replacement Strategy for Substation Protection and Automation Systems
The protection and control systems in the US utility industry are still primarily composed of electromechanical relays and systems. Over 80 percent of the relays are still electro...
Paul T. Myrda, Eric A. Udren