Sciweavers

2250 search results - page 136 / 450
» Authorizing applications in singularity
Sort
View
HICSS
2008
IEEE
165views Biometrics» more  HICSS 2008»
15 years 4 months ago
Can a P2P File-Sharing Network Become an e-Marketplace?
The prevalence of P2P technology contributes the ease of file-sharing, but it also brings some problems such as free-riding and copyright infringement. To solve these problems, ma...
Fu-ren Lin, Hau-ming Lo, Cong-ren Wang
VLDB
2007
ACM
160views Database» more  VLDB 2007»
15 years 4 months ago
Over-encryption: Management of Access Control Evolution on Outsourced Data
Data outsourcing is emerging today as a successful paradigm allowing users and organizations to exploit external services for the distribution of resources. A crucial problem to b...
Sabrina De Capitani di Vimercati, Sara Foresti, Su...
IFIP
2001
Springer
15 years 2 months ago
Systemic Functional Hypertexts (SFHT):
Abstract: On the background of rising Intranet applications the automatic generation of adaptable, context-sensitive hypertexts becomes more and more important [El-Beltagy et al., ...
Alexander Mehler, Rodney J. Clarke
SIGDOC
2000
ACM
15 years 2 months ago
Making complex document structures accessible through templates
We address two problems of technical authors in structured environments: (1) Structure definitions of the SGML school are limiting: they require one primary hierarchy and do not c...
Felix H. Gatzemeier, Oliver Meyer
CSCW
2008
ACM
14 years 12 months ago
The language of emotion in short blog texts
Emotion is central to human interactions, and automatic detection could enhance our experience with technologies. We investigate the linguistic expression of fine-grained emotion ...
Alastair J. Gill, Robert M. French, Darren Gergle,...