Sciweavers

567 search results - page 114 / 114
» Using the Multi-Layer Model for Building Interactive Graphic...
Sort
View
CCS
2008
ACM
13 years 8 months ago
A security architecture for transient trust
In extraordinary situations, certain individuals may require access to information for which they are not normally authorized. For example, to facilitate rescue of people trapped ...
Cynthia E. Irvine, Timothy E. Levin, Paul C. Clark...
JCDL
2009
ACM
130views Education» more  JCDL 2009»
14 years 18 days ago
Whetting the appetite of scientists: producing summaries tailored to the citation context
The amount of scientific material available electronically is forever increasing. This makes reading the published literature, whether to stay up-to-date on a topic or to get up ...
Stephen Wan, Cécile Paris, Robert Dale