Sciweavers

1818 search results - page 261 / 364
» How users use access control
Sort
View
151
Voted
CN
2006
161views more  CN 2006»
15 years 4 months ago
A multimedia traffic modeling framework for simulation-based performance evaluation studies
The emergence of high-speed communication systems has enabled the support of complex multimedia applications. The traffic patterns generated by such applications are likely to be ...
Assen Golaup, Hamid Aghvami
ICFP
2005
ACM
16 years 4 months ago
Continuations from generalized stack inspection
Implementing first-class continuations can pose a challenge if the target machine makes no provisions for accessing and re-installing the run-time stack. In this paper, we present...
Greg Pettyjohn, John Clements, Joe Marshall, Shrir...
FLAIRS
2003
15 years 5 months ago
Topic Extraction and Extension to Support Concept Mapping
Successful knowledge management may depend not only on knowledge capture, but on knowledge construction—on formulating new and useful knowledge that was not previously available...
David B. Leake, Ana Gabriela Maguitman, Thomas Rei...
VR
2002
IEEE
149views Virtual Reality» more  VR 2002»
15 years 9 months ago
Tension Based 7-DOF Force Feedback Device: SPIDAR-G
In this paper, we intend to demonstrate a new intuitive force-feedback device for advanced VR applications. Force feedback for the device is tension based and is characterized by ...
Seahak Kim, Shoichi Hasegawa, Yasuharu Koike, Mako...
WWW
2005
ACM
16 years 4 months ago
Improving understanding of website privacy policies with fine-grained policy anchors
Website privacy policies state the ways that a site will use personal identifiable information (PII) that is collected from fields and forms in web-based transactions. Since these...
Stephen E. Levy, Carl Gutwin