Sciweavers

4445 search results - page 726 / 889
» Reflective Authorization Systems
Sort
View
BIRTHDAY
2003
Springer
15 years 10 months ago
Distributed Cooperation and Adversity: Complexity Trade-Offs
The problem of cooperatively performing a collection of tasks in a decentralized setting where the computing medium is subject to adversarial perturbations is one of the fundament...
Chryssis Georgiou, Alexander Russell, Alexander A....
145
Voted
DEXA
2003
Springer
130views Database» more  DEXA 2003»
15 years 10 months ago
Finding Neighbor Communities in the Web Using Inter-site Graph
In recent years, link-based information retrieval methods from the Web are developed. A framework of these methods is a Web graph using pages as vertices and Web-links as edges. In...
Yasuhito Asano, Hiroshi Imai, Masashi Toyoda, Masa...
CHI
2010
ACM
15 years 10 months ago
Clutching at straws: using tangible interaction to provide non-visual access to graphs
We present a tangible user interface (TUI) called Tangible Graph Builder, that has been designed to allow visually impaired users to access graph and chart-based data. We describe...
David K. McGookin, Euan Robertson, Stephen A. Brew...
163
Voted
WEBDB
2010
Springer
155views Database» more  WEBDB 2010»
15 years 10 months ago
Learning Topical Transition Probabilities in Click Through Data with Regression Models
The transition of search engine users’ intents has been studied for a long time. The knowledge of intent transition, once discovered, can yield a better understanding of how diļ...
Xiao Zhang, Prasenjit Mitra
154
Voted
COOPIS
2002
IEEE
15 years 10 months ago
Object Security Attributes: Enabling Application-Specific Access Control in Middleware
This paper makes two main contributions towards establishing support for application-specific factors in middleware security mechanisms. First, it develops a simple classification...
Konstantin Beznosov