Sciweavers

1688 search results - page 316 / 338
» Access Control to Information in Pervasive Computing Environ...
Sort
View
KDD
2000
ACM
222views Data Mining» more  KDD 2000»
15 years 5 months ago
Interactive exploration of very large relational datasets through 3D dynamic projections
The grand tour, one of the most popular methods for multidimensional data exploration, is based on orthogonally projecting multidimensional data to a sequence of lower dimensional...
Li Yang
GI
1997
Springer
15 years 5 months ago
Persistent Object Systems: From Technology to Market
Abstract. This text describes how persistent object system technology developed in European basic research is being used by a small German startup software company to realize innov...
Andreas Gawecki, Florian Matthes, Joachim W. Schmi...
SIGUCCS
2003
ACM
15 years 7 months ago
A KeyServer for faculty, not just labs
Academic lab managers have been using Sassafras's KeyServer software for more than a decade to manage software licenses. KeyServer is server-based license management software...
Christopher Jones
CAISE
2004
Springer
15 years 7 months ago
Network-based Business Process Management: a Discussion on Embedding Business Logic in Communications Networks
Advanced Business Process Management (BPM) tools enable the decomposition of previously integrated and often ill-defined processes into reusable process modules. These process modu...
Louis-François Pau, Peter H. M. Vervest
SOUPS
2010
ACM
15 years 5 months ago
A closer look at recognition-based graphical passwords on mobile devices
Graphical password systems based on the recognition of photographs are candidates to alleviate current over-reliance on alphanumeric passwords and PINs. However, despite being bas...
Paul Dunphy, Andreas P. Heiner, N. Asokan