Sciweavers

662 search results - page 86 / 133
» Adventures in Personalized Information Access
Sort
View
HICSS
2002
IEEE
124views Biometrics» more  HICSS 2002»
15 years 2 months ago
Determinants of Voluntary Dissemination of Financial Data at Corporate Web Sites
: We hypothesize that this variation in the extent and nature of financial data disseminated through corporate Web sites is associated with the factors that influence the initial d...
Michael Ettredge, Vernon J. Richardson, Susan Scho...
WWW
2008
ACM
15 years 10 months ago
Finding the right facts in the crowd: factoid question answering over social media
Community Question Answering has emerged as a popular and effective paradigm for a wide range of information needs. For example, to find out an obscure piece of trivia, it is now ...
Jiang Bian, Yandong Liu, Eugene Agichtein, Hongyua...
SACMAT
2009
ACM
15 years 4 months ago
Towards formal security analysis of GTRBAC using timed automata
An access control system is often viewed as a state transition system. Given a set of access control policies, a general safety requirement in such a system is to determine whethe...
Samrat Mondal, Shamik Sural, Vijayalakshmi Atluri
OOPSLA
2007
Springer
15 years 4 months ago
Modular typestate checking of aliased objects
Objects often define usage protocols that clients must follow in order for these objects to work properly. Aliasing makes it notoriously difficult to check whether clients and i...
Kevin Bierhoff, Jonathan Aldrich
SACMAT
2006
ACM
15 years 3 months ago
Traust: a trust negotiation-based authorization service for open systems
In recent years, trust negotiation (TN) has been proposed as a novel access control solution for use in open system environments in which resources are shared across organizationa...
Adam J. Lee, Marianne Winslett, Jim Basney, Von We...