Sciweavers

16843 search results - page 30 / 3369
» On Generalized Authorization Problems
Sort
View
86
Voted
CHI
2009
ACM
16 years 1 months ago
What's mine is mine: territoriality in collaborative authoring
Territoriality, the expression of ownership towards an object, can emerge when social actors occupy a shared social space. In the case of Wikipedia, the prevailing cultural norm i...
Jennifer Thom-Santelli, Dan Cosley, Geri Gay
101
Voted
CHI
2007
ACM
16 years 25 days ago
Authoring sensor-based interactions by demonstration with direct manipulation and pattern recognition
Sensors are becoming increasingly important in interaction design. Authoring a sensor-based interaction comprises three steps: choosing and connecting the appropriate hardware, cr...
Björn Hartmann, Leith Abdulla, Manas Mittal, ...
103
Voted
ICFP
2008
ACM
16 years 12 days ago
AURA: a programming language for authorization and audit
This paper presents AURA, a programming language for access control that treats ordinary programming constructs (e.g., integers and recursive functions) and authorization logic co...
Limin Jia, Jeffrey A. Vaughan, Karl Mazurak, Jianz...
85
Voted
ECTEL
2009
Springer
15 years 7 months ago
LAG 2.0: Refining a Reusable Adaptation Language and Improving on Its Authoring
Reusable adaptation specifications for adaptive behaviour has come to the forefront of adaptive research recently, with EU projects such as GRAPPLE1, and PhD research efforts on de...
Alexandra I. Cristea, David Smits, Jon Bevan, Maur...
79
Voted
SIGIR
2009
ACM
15 years 7 months ago
Counting ancestors to estimate authority
The AncestorRank algorithm calculates an authority score by using just one characteristic of the web graph—the number of ancestors per node. For scalability, we estimate the num...
Jian Wang, Brian D. Davison