Sciweavers

602 search results - page 33 / 121
» An access control model for mobile physical objects
Sort
View
CW
2003
IEEE
15 years 7 months ago
Development of a recommendation system with multiple subjective evaluation process models
Current BtoC recommendation services utilize consumers’ purchased log as criteria for selecting information, yet it includes little information of the reason why he bought the i...
Emi Yano, Emi Sueyoshi, Isao Shinohara, Toshikazu ...
SACMAT
2005
ACM
15 years 7 months ago
Peer-to-peer access control architecture using trusted computing technology
It has been recognized for some time that software alone does not provide an adequate foundation for building a high-assurance trusted platform. The emergence of industry-standard...
Ravi S. Sandhu, Xinwen Zhang
WWW
2003
ACM
16 years 2 months ago
Dynamic service reconfiguration for wireless web access
This paper describes a dynamic service reconfiguration model where the proxy is composed of a chain of service objects called mobilets (pronounced as mo-be-lets), which can be dep...
Siu Nam Chuang, Alvin T. S. Chan, Jiannong Cao, Ro...
CSCW
2002
ACM
15 years 1 months ago
Physical and Virtual Tools: Activity Theory Applied to the Design of Groupware
Activity theory is based on the concept of tools mediating between subjects and objects. In this theory, an individual's creative interaction with his or her surroundings can ...
Morten Fjeld, Kristina Lauche, Martin Bichsel, Fre...
113
Voted
CHI
2011
ACM
14 years 5 months ago
OldGen: mobile phone personalization for older adults
Mobile devices are currently difficult to customize for the usability needs of elderly users. The elderly are instead referred to specially designed “senior phones” or softwar...
Alex Olwal, Dimitris Lachanas, Ermioni Zacharouli