Sciweavers

4445 search results - page 83 / 889
» Reflective Authorization Systems
Sort
View
138
Voted
MOBILITY
2009
ACM
15 years 8 months ago
Context-sensitive authorization in interaction patterns
Main requirement of recent computing environments, like mobile and then ubiquitous computing, is to adapt applications to context. On the other hand, access control generally trus...
Vincent Hourdin, Jean-Yves Tigli, Stephane Lavirot...
WOWMOM
2006
ACM
191views Multimedia» more  WOWMOM 2006»
15 years 10 months ago
Privacy Preserving Trust Authorization Framework Using XACML
: Nowadays many organisations share sensitive services through open network systems and this raises the need for an authorization framework that can interoperate even when the part...
Uche M. Mbanaso, G. S. Cooper, David W. Chadwick, ...
JCDL
2005
ACM
116views Education» more  JCDL 2005»
15 years 9 months ago
Name disambiguation in author citations using a K-way spectral clustering method
An author may have multiple names and multiple authors may share the same name simply due to name abbreviations, identical names, or name misspellings in publications or bibliogra...
Hui Han, Hongyuan Zha, C. Lee Giles
AIED
2005
Springer
15 years 9 months ago
Evaluating a Mixed-Initiative Authoring Environment: Is REDEEM for Real?
The REDEEM authoring tool allows teachers to create adapted learning environments for their students from existing material. Previous evaluations have shown that under experimental...
Shaaron Ainsworth, Piers Fleming
123
Voted
MKM
2004
Springer
15 years 9 months ago
Integrated Semantic Browsing of the Mizar Mathematical Library for Authoring Mizar Articles
Abstract. The Mizar system is equipped with a very large library containing tens of thousands of theorems and thousands of definitions, which often use overloaded notation. For eļ...
Grzegorz Bancerek, Josef Urban