Sciweavers

445 search results - page 83 / 89
» Authorization and Access Control in IRO-DB
Sort
View
WEBI
2005
Springer
15 years 3 months ago
Metadata Propagation in the Web Using Co-Citations
Given the large heterogeneity of the World Wide Web, using metadata on the search engines side seems to be a useful track for information retrieval. Though, because a manual quali...
Camille Prime-Claverie, Michel Beigbeder, Thierry ...
ELPUB
2000
ACM
15 years 2 months ago
Multimedia Cd-Rom as a Medium for Manuscript Preservation and Dissemination: The Design and Development of "Treasures of Islam"
The paper discusses the use of electronic publishing for the preservation and dissemination of rare manuscript material. It is based both upon the authors’ earlier work on multi...
Andrew Large, Jamshid Beheshti, Haidar Moukdad
USS
2008
14 years 12 months ago
NetAuth: Supporting User-Based Network Services
In User-Based Network Services (UBNS), the process servicing requests from user U runs under U's ID. This enables (operating system) access controls to tailor service authori...
Manigandan Radhakrishnan, Jon A. Solworth
CHI
2009
ACM
15 years 10 months ago
An evaluation of coordination techniques for protecting objects and territories in tabletop groupware
Indirect input techniques allow users to quickly access all parts of tabletop workspaces without the need for physical access; however, indirect techniques restrict the available ...
David Pinelle, Mutasem Barjawi, Miguel A. Nacenta,...
WIMOB
2008
IEEE
15 years 4 months ago
An Ad Hoc Network Infrastructure: Communication and Information Sharing for Emergency Response
— During an emergency response, access to a reliable communication infrastructure is required to exchange accurate information in a timely manner. Various communication technolog...
Raheleh B. Dilmaghani, Ramesh R. Rao