Sciweavers

1818 search results - page 189 / 364
» How users use access control
Sort
View
ADC
2000
Springer
326views Database» more  ADC 2000»
15 years 9 months ago
T-Tree or B-Tree: Main Memory Database Index Structure Revisited
While the B-tree (or the B+ -tree) is the most popular index structure in disk-based relational database systems, the Ttree has been widely accepted as a promising index structure...
Hongjun Lu, Yuet Yeung Ng, Zengping Tian
EUSAI
2007
Springer
15 years 11 months ago
Improving Mobile Solution Workflows and Usability Using Near Field Communication Technology
Organisations want nowadays more controlled processes and easily usable solutions, but achieving them requires winning many challenges. Radio Frequency Identification (RFID) based ...
Päivi Jaring, Vili Törmänen, Erkki ...
IUI
2004
ACM
15 years 10 months ago
Flexible interface migration
The goal of this work is to provide users immersed in a multi-platform environment with the possibility of interacting with an application while freely moving from one device to a...
Renata Bandelloni, Fabio Paternò
TGC
2005
Springer
15 years 10 months ago
A Practical Formal Model for Safety Analysis in Capability-Based Systems
Abstract. We present a formal system that models programmable abstractions for access control. Composite abstractions and patterns of arbitrary complexity are modeled as a configu...
Fred Spiessens, Peter Van Roy
126
Voted
ECAI
2004
Springer
15 years 10 months ago
Indirect and Conditional Sensing in the Event Calculus
Controlling the sensing of an environment by an agent has been accepted as necessary for effective operation within most practical domains. Usually, however, agents operate in par...
Jeremy Forth, Murray Shanahan