Sciweavers

1818 search results - page 267 / 364
» How users use access control
Sort
View
WICON
2008
15 years 5 months ago
Security vulnerabilities in IEEE 802.22
Cognitive Radio (CR) is seen as one of the enabling technologies for realizing a new spectrum access paradigm, viz. Opportunistic Spectrum Sharing (OSS). IEEE 802.22 is the world&...
Kaigui Bian, Jung Min Park
GRAPHICSINTERFACE
2011
14 years 7 months ago
Effects of view, input device, and track width on video game driving
Steering and driving tasks – where the user controls a vehicle or other object along a path – are common in many simulations and games. Racing video games have provided users ...
Scott Bateman, Andre Doucette, Robert Xiao, Carl G...
ISMAR
2007
IEEE
15 years 10 months ago
Interactive Focus and Context Visualization for Augmented Reality
In this article we present interactive Focus and Context (F+C) visualizations for Augmented Reality (AR) applications. We demonstrate how F+C visualizations are used to affect the...
Denis Kalkofen, Erick Méndez, Dieter Schmal...
SIGCOMM
2004
ACM
15 years 9 months ago
A system for authenticated policy-compliant routing
Internet end users and ISPs alike have little control over how packets are routed outside of their own AS, restricting their ability to achieve levels of performance, reliability,...
Barath Raghavan, Alex C. Snoeren
HPCA
1998
IEEE
15 years 8 months ago
The Impact of Data Transfer and Buffering Alternatives on Network Interface Design
The explosive growth in the performance of microprocessors and networks has created a new opportunity to reduce the latency of fine-grain communication. Microprocessor clock speed...
Shubhendu S. Mukherjee, Mark D. Hill