Sciweavers

1052 search results - page 127 / 211
» Managing User Focused Access to Distributed Knowledge
Sort
View
PODC
2011
ACM
14 years 20 days ago
Securing social networks
We present a cryptographic framework to achieve access control, privacy of social relations, secrecy of resources, and anonymity of users in social networks. The main idea is to u...
Michael Backes, Matteo Maffei, Kim Pecina
SIGUCCS
2003
ACM
15 years 3 months ago
Marketing computer support services through relationship and training strategies
In 2002, Harvard University's Division of Continuing Education (DCE) expanded its computer lab facility. This expansion allowed DCE to change its previous policy of restricti...
Brandon Bentley, Valerie Dixon, Ilana Rozanes, Pat...
ISMAR
2005
IEEE
15 years 3 months ago
Localisation and Interaction for Augmented Maps
Paper-based cartographic maps provide highly detailed information visualisation with unrivalled fidelity and information density. Moreover, the physical properties of paper affor...
Gerhard Reitmayr, Ethan Eade, Tom Drummond
INFOSCALE
2007
ACM
14 years 11 months ago
A model-based WiFi localization method
—Due to the proliferation of WiFi access points, indoor localization methods based on WiFi signal strengths are becoming more and more attractive because they don’t require add...
Dik Lun Lee, Qiuxia Chen
ESWS
2009
Springer
15 years 4 months ago
Ontology Evolution with Evolva
Abstract. Ontology evolution is a painstaking and time-consuming process, especially in information rich and dynamic domains. While ontology evolution refers both to the adaptation...
Fouad Zablith, Marta Sabou, Mathieu d'Aquin, Enric...