Sciweavers

1363 search results - page 137 / 273
» Distributed Authorization with Distributed Grammars
Sort
View
JCO
2010
97views more  JCO 2010»
14 years 9 months ago
Subhypergraph counts in extremal and random hypergraphs and the fractional q-independence
We study the extremal parameter N(n, m, H) which is the largest number of copies of a hypergraph H that can be formed of at most n vertices and m edges. Generalizing previous work...
Andrzej Dudek, Joanna Polcyn, Andrzej Rucinski
ORDER
2010
110views more  ORDER 2010»
14 years 9 months ago
The Complexity of Embedding Orders into Small Products of Chains
Embedding a partially ordered set into a product of chains is a classical way to encode it. Such encodings have been used in various fields such as object oriented programming or ...
Olivier Raynaud, Eric Thierry
CORR
2010
Springer
135views Education» more  CORR 2010»
14 years 6 months ago
Secure Communication and Access Control for Mobile Web Service Provisioning
It is now feasible to host basic web services on a smart phone due to the advances in wireless devices and mobile communication technologies. While the applications are quite welco...
Satish Narayana Srirama, Anton Naumenko
CHI
2009
ACM
15 years 12 months ago
A mischief of mice: examining children's performance in single display groupware systems with 1 to 32 mice
Mischief is a system for classroom interaction that allows multiple children to use individual mice and cursors to interact with a single large display [20]. While the system can ...
Neema Moraveji, Kori Inkpen, Ed Cutrell, Ravin Bal...
CHI
2008
ACM
15 years 11 months ago
A user study of policy creation in a flexible access-control system
Significant effort has been invested in developing expressive and flexible access-control languages and systems. However, little has been done to evaluate these systems in practic...
Lujo Bauer, Lorrie Faith Cranor, Robert W. Reeder,...