Sciweavers

490 search results - page 53 / 98
» Enabling User Control with Personal Identity Management
Sort
View
114
Voted
SEM
2004
Springer
15 years 5 months ago
Extending Standard Java Runtime Systems for Resource Management
Resource management is a precondition to build reliable, extensible middleware and to host potentially untrusted user components. Resource accounting allows to charge users for the...
Walter Binder, Jarle Hulaas
105
Voted
CCS
2008
ACM
15 years 2 months ago
A formal framework for reflective database access control policies
Reflective Database Access Control (RDBAC) is a model in which a database privilege is expressed as a database query itself, rather than as a static privilege contained in an acce...
Lars E. Olson, Carl A. Gunter, P. Madhusudan
116
Voted
SIGMOD
2003
ACM
146views Database» more  SIGMOD 2003»
16 years 20 days ago
The Piazza peer data management project
A major problem in today's information-driven world is that sharing heterogeneous, semantically rich data is incredibly difficult. Piazza is a peer data management system tha...
Igor Tatarinov, Zachary G. Ives, Jayant Madhavan, ...
CHI
2005
ACM
16 years 28 days ago
Participatory design of an orientation aid for amnesics
We present the participatory design and evaluation of an orientation aid for individuals who have anterograde amnesia. Our design team included six amnesics who have extreme diffi...
Mike Wu, Ronald Baecker, Brian Richards
113
Voted
CIKM
2008
Springer
15 years 2 months ago
SoRec: social recommendation using probabilistic matrix factorization
Data sparsity, scalability and prediction quality have been recognized as the three most crucial challenges that every collaborative filtering algorithm or recommender system conf...
Hao Ma, Haixuan Yang, Michael R. Lyu, Irwin King