Sciweavers

261 search results - page 15 / 53
» Application domain independent policy conflict analysis usin...
Sort
View
HICSS
2003
IEEE
109views Biometrics» more  HICSS 2003»
15 years 2 months ago
Towards a Structurational Theory of Information Systems: A Substantive Case Analysis
This paper employs the analysis of an interpretive case study within a Regional Train Operating Company (RTOC) to arrive at theoretical understandings of Information Systems (IS)....
Jeremy Rose, Ray Hackney
ACSAC
2002
IEEE
15 years 2 months ago
Access Control for Active Spaces
Active Spaces are physical spaces augmented with heterogeneous computing and communication devices along with supporting software infrastructure. This integration facilitates coll...
Geetanjali Sampemane, Prasad Naldurg, Roy H. Campb...
NSPW
1998
ACM
15 years 1 months ago
Meta Objects for Access Control: a Formal Model for Role-Based Principals
Object-based programming is becoming more and more popular and is currently conquering the world of distributed programming models. In object-based systems access control is often...
Thomas Riechmann, Franz J. Hauck
CANDC
2011
ACM
13 years 9 months ago
Understanding exploratory creativity in a visual domain
This paper describes a computerized aesthetic composition task that is based on a “creativity as search” metaphor. The technique collects detailed, moment-to-moment data about...
Kyle E. Jennings, Dean Keith Simonton, Stephen E. ...
92
Voted
JUCS
2008
196views more  JUCS 2008»
14 years 9 months ago
Information Integration for the Masses
Abstract: Information integration applications combine data from heterogeneous sources to assist the user in solving repetitive data-intensive tasks. Currently, such applications r...
Jim Blythe, Dipsy Kapoor, Craig A. Knoblock, Krist...