Sciweavers

6618 search results - page 1298 / 1324
» Information and Communication Technologies for Development
Sort
View
ACSAC
2002
IEEE
15 years 2 months ago
Access Control for Active Spaces
Active Spaces are physical spaces augmented with heterogeneous computing and communication devices along with supporting software infrastructure. This integration facilitates coll...
Geetanjali Sampemane, Prasad Naldurg, Roy H. Campb...
SACMAT
2010
ACM
15 years 2 months ago
Role-based access control (RBAC) in Java via proxy objects using annotations
We propose a new approach for applying Role-Based Access Control (RBAC) to methods in objects in the Java programming language. In our approach, a policy implementer (usually a de...
Jeff Zarnett, Mahesh V. Tripunitara, Patrick Lam
AGENTS
1999
Springer
15 years 1 months ago
Exception Handling in Agent Systems
A critical challenge to creating effective agent-based systems is allowing them to operate effectively when the operating environment is complex, dynamic, and error-prone. In this...
Mark Klein, Chrysanthos Dellarocas
68
Voted
CSCW
1998
ACM
15 years 1 months ago
Sustaining Mentoring Relationships On-Line
we have documented shares some of the influences discussed by Ackerman et. al., but has unique dynamics of its own which present unique technical and social demands. Using several ...
D. Kevin O'Neill, Louis M. Gomez
EDBT
2009
ACM
106views Database» more  EDBT 2009»
15 years 1 months ago
AlphaSum: size-constrained table summarization using value lattices
Consider a scientist who wants to explore multiple data sets to select the relevant ones for further analysis. Since the visualization real estate may put a stringent constraint o...
K. Selçuk Candan, Huiping Cao, Yan Qi 0002,...
« Prev « First page 1298 / 1324 Last » Next »