Sciweavers

4445 search results - page 776 / 889
» Reflective Authorization Systems
Sort
View
DIGRA
2005
Springer
15 years 10 months ago
Framing Virtual Law
Building on the work of games theorists and virtual world designers, this paper proposes a framework for understanding the real-virtual dichotomy in terms of a series of five fram...
Peter Edelmann
167
Voted
VLDB
2005
ACM
162views Database» more  VLDB 2005»
15 years 10 months ago
FiST: Scalable XML Document Filtering by Sequencing Twig Patterns
In recent years, publish-subscribe (pub-sub) systems based on XML document filtering have received much attention. In a typical pubsub system, subscribed users specify their inte...
Joonho Kwon, Praveen Rao, Bongki Moon, Sukho Lee
129
Voted
IUI
2004
ACM
15 years 10 months ago
Sheepdog: learning procedures for technical support
Technical support procedures are typically very complex. Users often have trouble following printed instructions describing how to perform these procedures, and these instructions...
Tessa A. Lau, Lawrence D. Bergman, Vittorio Castel...
CIKM
2004
Springer
15 years 10 months ago
Node ranking in labeled directed graphs
Our work is motivated by the problem of ranking hyperlinked documents for a given query. Given an arbitrary directed graph with edge and node labels, we present a new flow-based ...
Krishna Prasad Chitrapura, Srinivas R. Kashyap
PODC
2003
ACM
15 years 9 months ago
Scalable public-key tracing and revoking
Traitor Tracing Schemes constitute a very useful tool against piracy in the context of digital content broadcast. In such multi-recipient encryption schemes, each decryption key is...
Yevgeniy Dodis, Nelly Fazio, Aggelos Kiayias, Moti...