Sciweavers

2061 search results - page 130 / 413
» Authorization for Metacomputing Applications
Sort
View
CHI
2005
ACM
16 years 4 months ago
Evaluation of alternative presentation control techniques
Although slideshow presentation applications, such as PowerPointTM have been popular for years, the techniques commercially available to control them rely on mouse and keyboard, w...
Xiang Cao, Eyal Ofek, David Vronay
SIGMOD
2004
ACM
160views Database» more  SIGMOD 2004»
16 years 4 months ago
Extending Query Rewriting Techniques for Fine-Grained Access Control
Current day database applications, with large numbers of users, require fine-grained access control mechanisms, at the level of individual tuples, not just entire relations/views,...
Shariq Rizvi, Alberto O. Mendelzon, S. Sudarshan, ...
CSCW
2010
ACM
16 years 1 months ago
Characteristics of shared health reflections in a local community
We performed a content analysis of the information shared in a locally and culturally focused health application, EatWell. In EatWell, information is shared via the creation of au...
Andrea Grimes, Brian M. Landry, Rebecca E. Grinter
CHI
2010
ACM
15 years 11 months ago
Avaaj Otalo: a field study of an interactive voice forum for small farmers in rural India
In this paper we present the results of a field study of Avaaj Otalo (literally, “voice stoop”), an interactive voice application for small-scale farmers in Gujarat, India. T...
Neil Patel, Deepti Chittamuru, Anupam Jain, Paresh...
ICCSA
2005
Springer
15 years 9 months ago
Mobile Mini-payment Scheme Using SMS-Credit
Mobile Phone has been widely used in the world and adopted in different application areas involved with SMS has been evolved for downloading logo, ring-tones, advertisement, secur...
Simon Fong, Edison Lai