Sciweavers

1818 search results - page 212 / 364
» How users use access control
Sort
View
DAIS
2003
15 years 6 months ago
Middleware Support for Resource-Constrained Software Deployment
Abstract The JAMUS platform is dedicated to providing a safe runtime environment for untrusted Java application programs, while offering each of these programs access to the resour...
Nicolas Le Sommer, Frédéric Guidec
DBSEC
2004
170views Database» more  DBSEC 2004»
15 years 6 months ago
RBAC/MAC Security Analysis and Design for UML
In software construction, analysis investigates the boundary of a system (scope and requirements), its usage and access, and from a security perspective, who needs access to what ...
Thuong Doan, Steven A. Demurjian, Charles E. Phill...
CHI
2010
ACM
15 years 12 months ago
Effects of interior bezels of tiled-monitor large displays on visual search, tunnel steering, and target selection
Tiled-monitor large displays are widely used in various application domains. However, how their interior bezels affect user performance and behavior has not been fully understood....
Xiaojun Bi, Seok-Hyung Bae, Ravin Balakrishnan
GRAPHICSINTERFACE
2004
15 years 6 months ago
Revisiting Display Space Management: Understanding Current Practice to Inform Next-generation Design
Most modern computer systems allow the user to control the space allocated to interfaces through a window system. While much of the understanding of how people interact with windo...
Dugald Ralph Hutchings, John T. Stasko
WOWMOM
2005
ACM
109views Multimedia» more  WOWMOM 2005»
15 years 10 months ago
A High-Throughput MAC Strategy for Next-Generation WLANs
WLAN technology has been shown a revolutionary development during the last decade. Recently popularized IEEE 802.11a/gbased products can support up to 54 Mbps PHY (Physical layer)...
Seongkwan Kim, Youngsoo Kim, Sunghyun Choi, Kyungh...