Sciweavers

13895 search results - page 2557 / 2779
» Exploring
Sort
View
111
Voted
CSCW
2004
ACM
15 years 4 months ago
Putting systems into place: a qualitative study of design requirements for location-aware community systems
We present a conceptual framework for location-aware community systems and results from two studies of how sociallydefined places influence people's information sharing and c...
Quentin Jones, Sukeshini A. Grandhi, Steve Whittak...
102
Voted
CCS
2006
ACM
15 years 4 months ago
Safety analysis of usage control authorization models
The usage control (UCON) model was introduced as a unified approach to capture a number of extensions for traditional access control models. While the policy specification flexibi...
Xinwen Zhang, Ravi S. Sandhu, Francesco Parisi-Pre...
91
Voted
CCS
2006
ACM
15 years 4 months ago
Doppelganger: Better browser privacy without the bother
We introduce Doppelganger, a novel system for creating and enforcing fine-grained, privacy preserving browser cookie policies with low manual effort. Browser cookies pose privacy ...
Umesh Shankar, Chris Karlof
106
Voted
CF
2006
ACM
15 years 4 months ago
The potential of the cell processor for scientific computing
The slowing pace of commodity microprocessor performance improvements combined with ever-increasing chip power demands has become of utmost concern to computational scientists. As...
Samuel Williams, John Shalf, Leonid Oliker, Shoaib...
123
Voted
CIKM
2006
Springer
15 years 4 months ago
Evaluation by comparing result sets in context
Familiar evaluation methodologies for information retrieval (IR) are not well suited to the task of comparing systems in many real settings. These systems and evaluation methods m...
Paul Thomas, David Hawking
« Prev « First page 2557 / 2779 Last » Next »