Sciweavers

1818 search results - page 251 / 364
» How users use access control
Sort
View
HUC
2004
Springer
15 years 9 months ago
MouseField: A Simple and Versatile Input Device for Ubiquitous Computing
Although various interaction technologies for handling information in the ubiquitous computing environment have been proposed, some techniques are too simple for performing rich in...
Toshiyuki Masui, Koji Tsukada, Itiro Siio
RECSYS
2010
ACM
15 years 4 months ago
On the real-time web as a source of recommendation knowledge
The so-called real-time web (RTW) is a web of opinions, comments, and personal viewpoints, often expressed in the form of short, 140-character text messages providing abbreviated ...
Sandra Garcia Esparza, Michael P. O'Mahony, Barry ...
WISE
2009
Springer
16 years 1 months ago
Web Queries: From a Web of Data to a Semantic Web
ct One significant effort towards combining the virtues of Web search, viz. being accessible to untrained users and able to cope with vastly heterogeneous data, with those of dat...
François Bry, Tim Furche, Klara A. Weiand
JSAC
2008
161views more  JSAC 2008»
15 years 4 months ago
HC-MAC: A Hardware-Constrained Cognitive MAC for Efficient Spectrum Management
Abstract--Radio spectrum resource is of fundamental importance for wireless communication. Recent reports show that most available spectrum has been allocated. While some of the sp...
Juncheng Jia, Qian Zhang, Xuemin Shen
VLDB
1993
ACM
112views Database» more  VLDB 1993»
15 years 8 months ago
Specifying and Enforcing Intertask Dependencies
Extensions of the traditional atomic transaction model are needed to support the development of multi-system applications or work ows that access heterogeneous databases and legac...
Paul C. Attie, Munindar P. Singh, Amit P. Sheth, M...