Sciweavers

6137 search results - page 198 / 1228
» Securing Collaborative Applications
Sort
View
97
Voted
ITRUST
2005
Springer
15 years 7 months ago
Risk Models for Trust-Based Access Control(TBAC)
The importance of risk in trust-based systems is well established. This paper presents a novel model of risk and decision-making based on economic theory. Use of the model is illus...
Nathan Dimmock, Jean Bacon, David Ingram, Ken Mood...
COLING
2010
14 years 9 months ago
Local Space-Time Smoothing for Version Controlled Documents
Unlike static documents, version controlled documents are continuously edited by one or more authors. Such collaborative revision process makes traditional modeling and visualizat...
Seungyeon Kim, Guy Lebanon
IUI
2004
ACM
15 years 7 months ago
Second messenger: increasing the visibility of minority viewpoints with a face-to-face collaboration tool
This paper introduces the application Second Messenger, a tool for supporting face-to-face meetings and discussions. Second Messenger uses a speech-recognition engine as an input ...
Joan Morris DiMicco, Walter Bender
118
Voted
CP
2001
Springer
15 years 6 months ago
Collaborative Learning for Constraint Solving
Abstract. Although constraint programming offers a wealth of strong, generalpurpose methods, in practice a complex, real application demands a person who selects, combines, and ref...
Susan L. Epstein, Eugene C. Freuder
HUC
2000
Springer
15 years 6 months ago
Using Handheld Devices in Synchronous Collaborative Scenarios
: In this paper we present a platform specially designed for groupware applications running on handheld devices. Common groupware platforms request desktop computers as underlying ...
Jörg Roth, Claus Unger