Sciweavers

6931 search results - page 1381 / 1387
» Context and Design Agents
Sort
View
ISCA
2011
IEEE
269views Hardware» more  ISCA 2011»
14 years 1 months ago
Crafting a usable microkernel, processor, and I/O system with strict and provable information flow security
High assurance systems used in avionics, medical implants, and cryptographic devices often rely on a small trusted base of hardware and software to manage the rest of the system. ...
Mohit Tiwari, Jason Oberg, Xun Li 0001, Jonathan V...
CHI
2011
ACM
14 years 1 months ago
Should I open this email?: inbox-level cues, curiosity and attention to email
The quantity of email people receive each day can be overwhelming. Previous research suggests that when handling email, individuals prioritize certain messages for attention over ...
Jaclyn Wainer, Laura Dabbish, Robert Kraut
CODASPY
2011
14 years 1 months ago
Relationship-based access control: protection model and policy language
Social Network Systems pioneer a paradigm of access control that is distinct from traditional approaches to access control. Gates coined the term Relationship-Based Access Control...
Philip W. L. Fong
JUCS
2011
153views more  JUCS 2011»
14 years 19 days ago
A Framework to Evaluate Interface Suitability for a Given Scenario of Textual Information Retrieval
: Visualization of search results is an essential step in the textual Information Retrieval (IR) process. Indeed, Information Retrieval Interfaces (IRIs) are used as a link between...
Nicolas Bonnel, Max Chevalier, Claude Chrisment, G...
MOBISYS
2011
ACM
14 years 19 days ago
TagSense: a smartphone-based approach to automatic image tagging
Mobile phones are becoming the convergent platform for personal sensing, computing, and communication. This paper attempts to exploit this convergence towards the problem of autom...
Chuan Qin, Xuan Bao, Romit Roy Choudhury, Srihari ...
« Prev « First page 1381 / 1387 Last » Next »