Sciweavers

1818 search results - page 253 / 364
» How users use access control
Sort
View
COMPUTER
1998
68views more  COMPUTER 1998»
15 years 4 months ago
Making Network Interfaces Less Peripheral
Much of a computer’s value depends on how well it interacts with networks. To enhance this value, designers must improve the performance of networks delivered to users. Fortunat...
Shubhendu S. Mukherjee, Mark D. Hill
JSAC
2007
157views more  JSAC 2007»
15 years 4 months ago
Network-aware P2P file sharing over the wireless mobile networks
— With the coming wireless mobile networks era and the popular use of P2P applications, how to improve the resource retrieval and discovery for P2P file sharing applications in ...
Chung-Ming Huang, Tz-Heng Hsu, Ming-Fa Hsu
MIE
2008
194views Healthcare» more  MIE 2008»
15 years 5 months ago
Developing a Shared Electronic Health Record for Patients and Clinicians
Improving Shared Decision Making (SDM) and patient-provider communication, and providing all citizens with equal access to health information has become a high priority health poli...
Cornelia M. Ruland, Haakon Bryhni, Roar Andersen, ...
AAAI
1996
15 years 5 months ago
Interactive Information Retrieval Systems with Minimalist Representation
Almost any information you might want is becoming available on-line. The problem is how to find what you need. One strategy to improve access to existing information sources, is i...
Eric A. Domeshek, Smadar Kedar, Andrew S. Gordon
ICDE
2012
IEEE
232views Database» more  ICDE 2012»
13 years 6 months ago
A Dataset Search Engine for the Research Document Corpus
— A key step in validating a proposed idea or system is to evaluate over a suitable data set. However, to this date there have been no useful tools for researchers to understand ...
Meiyu Lu, Srinivas Bangalore, Graham Cormode, Mari...