Sciweavers

1818 search results - page 221 / 364
» How users use access control
Sort
View
127
Voted
IEEEARES
2008
IEEE
15 years 11 months ago
Static Validation of Licence Conformance Policies
Policy conformance is a security property gaining importance due to commercial interest like Digital Rights Management. It is well known that static analysis can be used to valida...
René Rydhof Hansen, Flemming Nielson, Hanne...
MTA
2008
186views more  MTA 2008»
15 years 5 months ago
Tactile web browsing for blind people
Information on the World Wide Web becomes more and more important for our society. For blind people this is a chance to access more information for their everyday life. In this pap...
Martin Rotard, Christiane Taras, Thomas Ertl
ICC
2009
IEEE
142views Communications» more  ICC 2009»
16 years 3 days ago
SDMA for 60GHz Gigabit Wireless Networks
—With the opening of the 60 GHz spectrum for WLANs, there has been a great deal of interest in academia and industry on how best to exploit the more than 5 GHz of available bandw...
Candy Yiu, Suresh Singh
PETRA
2009
ACM
15 years 12 months ago
Towards a social fabric for pervasive assistive environments
The digital divide refers to a lack of technological access, part of which involves exclusion from a blooming arena of social interaction. People without mobile phones or PCs cann...
Clare Owens, David E. Millard, Andrew Stanford-Cla...
ICNS
2007
IEEE
15 years 11 months ago
On Maximizing Provider Revenue in Market-Based Compute Grids
Market-based compute grids encompass service providers offering limited resources to potential users with varying demands and willingness to pay. Providers face difficult decisions...
Vladimir Marbukh, Kevin Mills