Sciweavers

1818 search results - page 272 / 364
» How users use access control
Sort
View
ICC
2007
IEEE
15 years 10 months ago
A Support System for Designing Ubiquitous Service Composition Scenarios
—Ubiquitous service composition provides new services and applications seamlessly by establishing cooperation among any devices in home networks and any services in service provi...
Takaaki Moriya, Hiroyuki Ohnishi, Makoto Yoshida, ...
ICDE
2005
IEEE
128views Database» more  ICDE 2005»
16 years 5 months ago
Exploiting Correlated Attributes in Acquisitional Query Processing
Sensor networks and other distributed information systems (such as the Web) must frequently access data that has a high per-attribute acquisition cost, in terms of energy, latency...
Amol Deshpande, Carlos Guestrin, Wei Hong, Samuel ...
WWW
2004
ACM
16 years 4 months ago
Impact of search engines on page popularity
Recent studies show that a majority of Web page accesses are referred by search engines. In this paper we study the widespread use of Web search engines and its impact on the ecol...
Junghoo Cho, Sourashis Roy
EUSAI
2004
Springer
15 years 9 months ago
Shaping the Ambience of Homes with Domestic Hypermedia
We currently witness a massive digitization of domestic materials e.g. photos, music, calendars, recipes, notes, messages. This digitization provides new conditions for how we inte...
Marianne Graves Petersen, Kaj Grønbæk
SIGSOFT
2000
ACM
15 years 8 months ago
Automated systematic testing for constraint-based interactive services
Constraint-based languages can express in a concise way the complex logic of a new generation of interactive services for applications such as banking or stock trading, that must ...
Patrice Godefroid, Lalita Jategaonkar Jagadeesan, ...