Sciweavers

4004 search results - page 796 / 801
» Selecting an Approach to Designing Group Support Systems
Sort
View
ACSC
2003
IEEE
15 years 2 months ago
Context-Sensitive Mobile Database Summarisation
In mobile computing environments, as a result of the reduced capacity of local storage, it is commonly not feasible to replicate entire datasets on each mobile unit. In addition, ...
Darin Chan, John F. Roddick
119
Voted
CODASPY
2011
14 years 1 months ago
Relationship-based access control: protection model and policy language
Social Network Systems pioneer a paradigm of access control that is distinct from traditional approaches to access control. Gates coined the term Relationship-Based Access Control...
Philip W. L. Fong
CIKM
2011
Springer
13 years 9 months ago
An efficient method for using machine translation technologies in cross-language patent search
Topics in prior-art patent search are typically full patent applications and relevant items are patents often taken from sources in different languages. Cross language patent retr...
Walid Magdy, Gareth J. F. Jones
TON
2012
13 years 2 days ago
A New Cell-Counting-Based Attack Against Tor
Abstract—Various low-latency anonymous communication systems such as Tor and Anonymizer have been designed to provide anonymity service for users. In order to hide the communicat...
Zhen Ling, Junzhou Luo, Wei Yu, Xinwen Fu, Dong Xu...
SIGMOD
2010
ACM
267views Database» more  SIGMOD 2010»
15 years 2 months ago
Processing proximity relations in road networks
Applications ranging from location-based services to multi-player online gaming require continuous query support to monitor, track, and detect events of interest among sets of mov...
Zhengdao Xu, Hans-Arno Jacobsen