Sciweavers

1818 search results - page 248 / 364
» How users use access control
Sort
View
PDP
2008
IEEE
15 years 10 months ago
Privacy Protection in Context Transfer Protocol
In the future 4G wireless networks will span across different administrative domains. In order to provide secure seamless handovers in such an environment the Context Transfer Pro...
Giorgos Karopoulos, Georgios Kambourakis, Stefanos...
IEPOL
2007
58views more  IEPOL 2007»
15 years 4 months ago
Broadband adoption and content consumption
We explore how broadband access drives changes in the quantity and diversity of consumption of online content by using panel data that describes household Internet usage before an...
Lorin M. Hitt, Prasanna Tambe
CHI
2006
ACM
16 years 4 months ago
Utilizing mobile phones as ambient information displays
Mobile phones have become a ubiquitous technology and for many people a daily companion, primarily used for communication and information access. The fact that the phone is accomp...
Albrecht Schmidt, Jonna Häkkilä, Richard...
ECLIPSE
2006
ACM
15 years 10 months ago
Generating run-time progress reports for a points-to analysis in Eclipse
Eclipse plug-ins have access to a rich collection of GUI components. One such component is the progress bar, which allows a long-running task to provide Eclipse users with feedbac...
Jason Sawin, Mariana Sharp, Atanas Rountev
ARCS
2004
Springer
15 years 9 months ago
The Value of Handhelds in Smart Environments
Abstract. The severe resource restrictions of computer-augmented everyday artifacts imply substantial problems for the design of applications in smart environments. Some of these p...
Frank Siegemund, Christian Floerkemeier, Harald Vo...