Sciweavers

3557 search results - page 653 / 712
» Authoring Presentation for OpenMath
Sort
View
SACMAT
2009
ACM
15 years 7 months ago
Dynamic mandatory access control for multiple stakeholders
In this paper, we present a mandatory access control system that uses input from multiple stakeholders to compose policies based on runtime information. In the emerging ubiquitous...
Vikhyath Rao, Trent Jaeger
SIGECOM
2009
ACM
117views ECommerce» more  SIGECOM 2009»
15 years 7 months ago
Sybilproof transitive trust protocols
We study protocols to enable one user (the principal) to make potentially profitable but risky interactions with another user (the agent), in the absence of direct trust between ...
Paul Resnick, Rahul Sami
SIGIR
2009
ACM
15 years 7 months ago
Personalized tag recommendation using graph-based ranking on multi-type interrelated objects
Social tagging is becoming increasingly popular in many Web 2.0 applications where users can annotate resources (e.g. Web pages) with arbitrary keywords (i.e. tags). A tag recomme...
Ziyu Guan, Jiajun Bu, Qiaozhu Mei, Chun Chen, Can ...
110
Voted
VRML
2009
ACM
15 years 7 months ago
Extending X3D for distributed multimedia processing and control
Web-based applications of interactive 3D computer graphics are showing a tendency to get more interconnected and visually complex. Virtual communities like Second Life demand real...
Michael Repplinger, Alexander Löffler, Benjam...
80
Voted
CHI
2010
ACM
15 years 7 months ago
Quasi-qwerty soft keyboard optimization
It has been well understood that optimized soft keyboard layouts improve motor movement efficiency over the standard Qwerty layouts, but have the drawback of long initial visual s...
Xiaojun Bi, Barton A. Smith, Shumin Zhai