Sciweavers

1818 search results - page 234 / 364
» How users use access control
Sort
View
GLOBECOM
2007
IEEE
15 years 10 months ago
Improved Measurement-Based Frequency Allocation Algorithms for Wireless Networks
Abstract— This paper presents three algorithms that outperform all other published work for allocating a limited number of orthogonal frequency channels to access points (APs) in...
Jeremy K. Chen, Gustavo de Veciana, Theodore S. Ra...
SI3D
2006
ACM
15 years 10 months ago
ShowMotion: camera motion based 3D design review
We describe a new interactive system for 3D design review, built to exploit the visual perception cue of motion parallax, in order to enhance shape perception and aesthetic evalua...
Nicholas Burtnyk, Azam Khan, George W. Fitzmaurice...
NCA
2005
IEEE
15 years 10 months ago
An Adaptive Reputation-based Trust Framework for Peer-to-Peer Applications
In distributed P2P environments, peers (i.e., users) often have to request the services from some unfamiliar peers (i.e., resources) that could be altruistic, selfish, or even ma...
William Sears, Zhen Yu, Yong Guan
INFOCOM
2003
IEEE
15 years 9 months ago
Receiver-Driven Bandwidth Sharing for TCP
— Applications using TCP, such as web-browsers, ftp, and various P2P programs, dominate most of the Internet traffic today. In many cases the last-hop access links are bottlenec...
Puneet Mehra, Christophe De Vleeschouwer, Avideh Z...
USS
2004
15 years 5 months ago
Design of the EROS Trusted Window System
Window systems are the primary mediator of user input and output in modern computing systems. They are also a commonly used interprocess communication mechanism. As a result, they...
Jonathan S. Shapiro, John Vanderburgh, Eric Northu...