Sciweavers

4128 search results - page 673 / 826
» Learning and using relational theories
Sort
View
CCS
2008
ACM
15 years 5 days ago
On spatio-temporal constraints and inheritance in role-based access control
Pervasive computing environments have created a requirement for spatial- and temporal-aware access control systems. Although temporal, spatial and spatio-temporal role-based acces...
Liang Chen, Jason Crampton
CIKM
2008
Springer
15 years 4 days ago
Ranked feature fusion models for ad hoc retrieval
We introduce the Ranked Feature Fusion framework for information retrieval system design. Typical information retrieval formalisms such as the vector space model, the bestmatch mo...
Jeremy Pickens, Gene Golovchinsky
FPGA
2008
ACM
623views FPGA» more  FPGA 2008»
14 years 11 months ago
From the bitstream to the netlist
We present an in-depth analysis of the Xilinx bitstream format. The information gathered in this paper allows bitstream compilation and decompilation. While not actually compromis...
Jean-Baptiste Note, Éric Rannaud
70
Voted
BCSHCI
2007
14 years 11 months ago
Encouraging witting participation and performance in digital live art
We describe a framework for characterizing people’s behavior with Digital Live Art. Our framework considers people’s wittingness, technical skill, and interpretive abilities i...
Jennifer G. Sheridan, Nick Bryan-Kinns, Alice Bayl...
DGO
2007
125views Education» more  DGO 2007»
14 years 11 months ago
Members of congress websites: diffusion at the tip of the iceberg
How do Members of Congress manage the opportunities that the Internet offers? Here we present the initial results from interviews with 100 Congressional offices about their decisi...
David Lazer, Ines Mergel, Curt Ziniel, Kevin Ester...