Sciweavers

4445 search results - page 785 / 889
» Reflective Authorization Systems
Sort
View
CHI
2004
ACM
15 years 10 months ago
Affective sensors, privacy, and ethical contracts
Sensing affect raises critical privacy concerns, which are examined here using ethical theory, and with a study that illuminates the connection between ethical theory and privacy....
Carson Reynolds, Rosalind W. Picard
VLDB
2005
ACM
185views Database» more  VLDB 2005»
15 years 10 months ago
Storing and querying XML data using denormalized relational databases
XML database systems emerge as a result of the acceptance of the XML data model. Recent works have followed the promising approach of building XML database management systems on un...
Andrey Balmin, Yannis Papakonstantinou
MOBISYS
2007
ACM
15 years 9 months ago
Real-time deployment of multihop relays for range extension
When the range of single-hop wireless communication is limited by distance or harsh radio propagation conditions, relays can be used to extend the communication range through mult...
Michael R. Souryal, Johannes Geissbuehler, Leonard...
EUROSYS
2009
ACM
15 years 7 months ago
Isolating web programs in modern browser architectures
Many of today’s web sites contain substantial amounts of client-side code, and consequently, they act more like programs than simple documents. This creates robustness and perfo...
Charles Reis, Steven D. Gribble
IUI
2010
ACM
15 years 7 months ago
Haptic augmented reality dental trainer with automatic performance assessment
We developed an augmented reality (AR) dental training simulator utilizing a haptic (force feedback) device. A number of dental procedures such as crown preparation and opening ac...
Phattanapon Rhienmora, Kugamoorthy Gajananan, Pete...