Sciweavers

4445 search results - page 758 / 889
» Reflective Authorization Systems
Sort
View
97
Voted
HCI
2009
14 years 8 months ago
The Evolution of a Web Accessibility Testing Protocol
In early 2007, the California State University (CSU) system initiated a program to make all information technology accessible to persons with disabilities; the authors were appoint...
Tom Jewett, Wayne Dick
HIPC
2009
Springer
14 years 8 months ago
Improved opportunistic scheduling algorithms for WiMAX Mobile Multihop Relay networks
We investigate the problem of scheduling in OFDMbased multihop relay networks with special emphasis on IEEE 802.16j based WiMAX networks. In such networks, scheduling is the probl...
Srinath Narasimha, Krishna M. Sivalingam
DEBU
2010
127views more  DEBU 2010»
14 years 7 months ago
Provenance in ORCHESTRA
Sharing structured data today requires agreeing on a standard schema, then mapping and cleaning all of the data to achieve a single queriable mediated instance. However, for setti...
Todd J. Green, Grigoris Karvounarakis, Zachary G. ...
IJACTAICIT
2010
192views more  IJACTAICIT 2010»
14 years 7 months ago
Service Level Security using Expected Clandestine Figure for Corroboration of Web Service Consumer
In the e-age, internet and e-affairs are the composite blend of business process and technology; the organization must retain the state of computing system or risk malicious assau...
M. S. Saleem Basha
82
Voted
CORR
2011
Springer
139views Education» more  CORR 2011»
14 years 5 months ago
A Science Model Driven Retrieval Prototype
This paper is about a better understanding on the structure and dynamics of science and the usage of these insights for compensating the typical problems that arises in metadata-d...
Philipp Mayr, Philipp Schaer, Peter Mutschke