A user-centric view

被引:0
|
作者
Slayton, Derek [1 ]
机构
[1] Citrix Syst, Westford, MA USA
来源
COMMUNICATIONS NEWS | 2006年 / 43卷 / 08期
关键词
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
引用
收藏
页码:21 / 21
页数:1
相关论文
共 50 条
  • [1] Accessing and Disclosing Protected Resources: A User-Centric View
    Olesen, Henning
    Khajuria, Samant
    [J]. 2015 IEEE 81ST VEHICULAR TECHNOLOGY CONFERENCE (VTC SPRING), 2015,
  • [2] User-Centric View of Smart Attacks in Wireless Networks
    Xie, Caixia
    Xiao, Liang
    [J]. 2016 IEEE INTERNATIONAL CONFERENCE ON UBIQUITOUS WIRELESS BROADBAND (ICUWB2016), 2016,
  • [3] A semantic view mechanism for user-centric video adaptation
    Ding, DW
    Feng, W
    Ngo, CW
    Li, Q
    [J]. PROCEEDINGS OF THE 8TH JOINT CONFERENCE ON INFORMATION SCIENCES, VOLS 1-3, 2005, : 787 - 790
  • [4] A user-centric view of QoS-aware communication
    Michelitsch, G
    Welling, G
    Ott, M
    [J]. COMPUTER COMMUNICATIONS, 1998, 21 (15) : 1310 - 1319
  • [5] A user-centric view of data warehouse maintenance issues
    Engström, H
    Chakravarthy, S
    Lings, B
    [J]. ADVANCES IN DATABASES, 2000, 1832 : 68 - 80
  • [6] User-centric Design
    Fuchs, Andreas
    [J]. ATZheavy Duty Worldwide, 2020, 13 (02) : 8 - 9
  • [7] User-Centric Security
    Feth, Denis
    [J]. 2015 10TH JOINT MEETING OF THE EUROPEAN SOFTWARE ENGINEERING CONFERENCE AND THE ACM SIGSOFT SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING (ESEC/FSE 2015) PROCEEDINGS, 2015, : 1034 - 1037
  • [8] User-centric broadband
    Lombard, D
    [J]. ALCATEL TELECOMMUNICATIONS REVIEW, 2005, (01): : 2 - 3
  • [9] CMS Dashboard Task Monitoring: A user-centric monitoring view
    Karavakis, Edward
    Andreeva, Julia
    Khan, Akram
    Maier, Gerhild
    Gaidioz, Benjamin
    [J]. 17TH INTERNATIONAL CONFERENCE ON COMPUTING IN HIGH ENERGY AND NUCLEAR PHYSICS (CHEP09), 2010, 219
  • [10] User-Centric View of Jamming Games in Cognitive Radio Networks
    Xiao, Liang
    Liu, Jinliang
    Li, Qiangda
    Mandayam, Narayan B.
    Poor, H. Vincent
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (12) : 2578 - 2590