Sciweavers

1818 search results - page 268 / 364
» How users use access control
Sort
View
IPSN
2007
Springer
15 years 10 months ago
Harbor: software-based memory protection for sensor nodes
Many sensor nodes contain resource constrained microcontrollers where user level applications, operating system components, and device drivers share a single address space with no...
Ram Kumar, Eddie Kohler, Mani B. Srivastava
131
Voted
UIST
2005
ACM
15 years 9 months ago
A1: end-user programming for web-based system administration
System administrators work with many different tools to manage and fix complex hardware and software infrastructure in a rapidly paced work environment. Through extensive field st...
Eser Kandogan, Eben M. Haber, Rob Barrett, Allen C...
JCST
2008
140views more  JCST 2008»
15 years 4 months ago
ROPAS: Cross-Layer Cognitive Architecture for Mobile UWB Networks
The allocation of bandwidth to unlicensed users, without significantly increasing the interference on the existing licensed users, is a challenge for Ultra Wideband (UWB) networks....
Chittabrata Ghosh, Bin Xie, Dharma P. Agrawal
156
Voted
IJWIN
2002
166views more  IJWIN 2002»
15 years 3 months ago
QoS Routing for Mesh-Based Wireless LANs
Wireless LANs with their increased data rate become an attractive technology for connecting mobile users to the Internet. Efficient deployment of wireless LANs will require the ab...
Qi Xue, Aura Ganz
131
Voted
ICCV
2005
IEEE
15 years 9 months ago
Fast Head Tilt Detection for Human-Computer Interaction
Abstract. Accurate head tilt detection has a large potential to aid people with disabilities in the use of human-computer interfaces and provide universal access to communication s...
Benjamin N. Waber, John J. Magee, Margrit Betke