Sciweavers

1618 search results - page 309 / 324
» Privacy Interfaces for Information Management
Sort
View
ADBIS
2007
Springer
124views Database» more  ADBIS 2007»
15 years 6 months ago
Fast and Efficient Log File Compression
Contemporary information systems are replete with log files, created in multiple places (e.g., network servers, database management systems, user monitoring applications, system se...
Przemyslaw Skibinski, Jakub Swacha
SACMAT
2010
ACM
15 years 4 months ago
Role-based access control (RBAC) in Java via proxy objects using annotations
We propose a new approach for applying Role-Based Access Control (RBAC) to methods in objects in the Java programming language. In our approach, a policy implementer (usually a de...
Jeff Zarnett, Mahesh V. Tripunitara, Patrick Lam
106
Voted
ACMDIS
2010
ACM
14 years 12 months ago
The CLOTHO project: predicting application utility
When using the computer, each user has some notion that "these applications are important" at a given point in time. We term this subset of applications that the user va...
Joshua M. Hailpern, Nicholas Jitkoff, Joseph Subid...
WWW
2005
ACM
16 years 13 days ago
An environment for collaborative content acquisition and editing by coordinated ubiquitous devices
Digital content is not only stored by servers on the Internet, but also on various embedded devices belonging to ubiquitous networks. In this paper, we propose a content processin...
Yutaka Kidawara, Tomoyuki Uchiyama, Katsumi Tanaka
111
Voted
CHI
2009
ACM
16 years 10 days ago
PenLight: combining a mobile projector and a digital pen for dynamic visual overlay
Digital pen systems, originally designed to digitize annotations made on physical paper, are evolving to permit a wider variety of applications. Although the type and quality of p...
Hyunyoung Song, Tovi Grossman, George W. Fitzmauri...