Sciweavers

1818 search results - page 271 / 364
» How users use access control
Sort
View
ISEM
2006
112views more  ISEM 2006»
15 years 4 months ago
Ubiquitous computing: connecting Pervasive computing through Semantic Web
Ubiquitous computing refers to building a global computing environment where seamless and invisible access to computing resources is provided to the user. Pervasive computing deal...
Sachin Singh, Sushil Puradkar, Yugyung Lee
WWW
2011
ACM
14 years 11 months ago
OXPath: little language, little memory, great value
Data about everything is readily available on the web—but often only accessible through elaborate user interactions. For automated decision support, extracting that data is esse...
Andrew Jon Sellers, Tim Furche, Georg Gottlob, Gio...
CG
2000
Springer
15 years 3 months ago
Sketching space
In this paper we present a sketch modelling system which we call Stilton. The program resembles a desktop VRML browser, allowing a user to navigate a 3D model in a perspective pro...
Alasdair Turner, David Chapman, Alan Penn
CHI
2004
ACM
16 years 4 months ago
Link colors guide a search
While much basic research exists on the effects of various visual properties on visual search, the application of such research to real-world tasks is lacking. The purpose of this...
Tim Halverson, Anthony J. Hornof
SASO
2008
IEEE
15 years 10 months ago
Pervasive Self-Learning with Multi-modal Distributed Sensors
Truly ubiquitous computing poses new and significant challenges. A huge number of heterogeneous devices will interact to perform complex distributed tasks. One of the key aspects...
Nicola Bicocchi, Marco Mamei, Andrea Prati, Rita C...