Sciweavers

567 search results - page 114 / 114
» Using the Multi-Layer Model for Building Interactive Graphic...
Sort
View
CCS
2008
ACM
14 years 23 days ago
A security architecture for transient trust
In extraordinary situations, certain individuals may require access to information for which they are not normally authorized. For example, to facilitate rescue of people trapped ...
Cynthia E. Irvine, Timothy E. Levin, Paul C. Clark...
JCDL
2009
ACM
130views Education» more  JCDL 2009»
14 years 5 months ago
Whetting the appetite of scientists: producing summaries tailored to the citation context
The amount of scientific material available electronically is forever increasing. This makes reading the published literature, whether to stay up-to-date on a topic or to get up ...
Stephen Wan, Cécile Paris, Robert Dale