Sciweavers

464 search results - page 6 / 93
» Authorisation Using Attributes from Multiple Authorities
Sort
View
93
Voted
SCN
2008
Springer
157views Communications» more  SCN 2008»
14 years 9 months ago
Insider attack attribution using signal strength-based hyperbolic location estimation
A rogue insider, in a wireless network, is an authenticated member that exploits possession of a valid identity in order to launch an attack. A typical example is the transmission...
Christine Laurendeau, Michel Barbeau
HT
2009
ACM
15 years 4 months ago
Designing hypertext tools to facilitate authoring multiple points-of-view stories
How can authoring tools help authors create complex, innovative hypertext narrative structures? Tools for creating hypertext fiction typically represent such narratives in the fo...
Alex Mitchell, Kevin McGee
ISLPED
2006
ACM
109views Hardware» more  ISLPED 2006»
15 years 3 months ago
Power reduction of multiple disks using dynamic cache resizing and speed control
This paper presents an energy-conservation method for multiple disks and their cache memory. Our method periodically resizes the cache memory and controls the rotation speeds unde...
Le Cai, Yung-Hsiang Lu
76
Voted
JSW
2007
124views more  JSW 2007»
14 years 9 months ago
Shibboleth as a Tool for Authorized Access Control to the Subversion Repository System
—Shibboleth is an architecture and protocol for allowing users to authenticate and be authorized to use a remote resource by logging into the identity management system that is m...
Linh Ngo, Amy W. Apon
CHI
2011
ACM
14 years 1 months ago
Computers can't give credit: how automatic attribution falls short in an online remixing community
In this paper, we explore the role that attribution plays in shaping user reactions to content reuse, or remixing, in a large user-generated content community. We present two stud...
Andrés Monroy-Hernández, Benjamin Ma...