Sciweavers

449 search results - page 40 / 90
» User experiences with sharing and access control
Sort
View
ICC
2008
IEEE
176views Communications» more  ICC 2008»
15 years 7 months ago
A k-Nearest Neighbor Approach for User Authentication through Biometric Keystroke Dynamics
— Keystroke dynamics exhibit people’s behavioral features which are similar to hand signatures. A major problem hindering the large scale deployment of this technology is its h...
Jiankun Hu, Don Gingrich, Andy Sentosa
ICLP
2007
Springer
15 years 5 months ago
User-Definable Resource Bounds Analysis for Logic Programs
We present a static analysis that infers both upper and lower bounds on the usage that a logic program makes of a set of user-definable resources. The inferred bounds will in gener...
Jorge Navas, Edison Mera, Pedro López-Garc&...
ASSETS
2008
ACM
15 years 3 months ago
A comparative test of web accessibility evaluation methods
Accessibility auditors have to choose a method when evaluating accessibility: expert review (a.k.a. conformance testing), user testing, subjective evaluations, barrier walkthrough...
Giorgio Brajnik
ACMICEC
2008
ACM
262views ECommerce» more  ACMICEC 2008»
15 years 3 months ago
Preventing information leakage between collaborating organisations
Information sharing and protection against leakage is a critical problem especially for organisations having sensitive information. Sharing content between individuals in the same...
Muntaha Alawneh, Imad M. Abbadi
INFOCOM
2003
IEEE
15 years 6 months ago
An FDD Wideband CDMA MAC Protocol for Wireless Multimedia Networks
Abstract—A medium access control (MAC) protocol is developed for wireless multimedia networks based on frequency division duplex (FDD) wideband code division multiple access (CDM...
Xudong Wang