Sciweavers

436 search results - page 12 / 88
» Arguing for gaining access to information
Sort
View
CHI
2009
ACM
15 years 3 months ago
Yours, mine and (not) ours: social influences on group information repositories
Group information repositories are systems for storing and organizing files in a central location all group members can access. The functionality and capabilities of these systems...
Emilee Rader
CORR
2007
Springer
111views Education» more  CORR 2007»
14 years 11 months ago
Hypocomputation
Most research into hypercomputation focuses only on machines able to prove stronger results the basic Turing Machine, hence the phrase hypercomputation. However, developing hyperco...
David Love
ISW
2004
Springer
15 years 5 months ago
Model-Checking Access Control Policies
We present a model of access control which provides fine-grained data-dependent control, can express permissions about permissions, can express delegation, and can describe syste...
Dimitar P. Guelev, Mark Ryan, Pierre-Yves Schobben...
INFOCOM
2002
IEEE
15 years 4 months ago
FPAC: Fast, Fixed-Cost Authentication for Access to Reserved Resources
—Enhanced network services often involve allocating resources (bandwidth/buffer space) preferentially to packets belonging to certain flows or traffic classes. Such services ar...
Kenneth L. Calvert, Srinivasan Venkatraman, Jim Gr...
DEXA
2008
Springer
181views Database» more  DEXA 2008»
15 years 1 months ago
Query Recommendation Using Large-Scale Web Access Logs and Web Page Archive
Query recommendation suggests related queries for search engine users when they are not satisfied with the results of an initial input query, thus assisting users in improving sear...
Lin Li, Shingo Otsuka, Masaru Kitsuregawa