Sciweavers

314 search results - page 34 / 63
» Social Software and the Emergence of Control
Sort
View
SACMAT
2009
ACM
15 years 4 months ago
Ensuring spatio-temporal access control for real-world applications
Traditional access control models, such as Role-Based Access Control (RBAC), do not take into account contextual information, such as location and time, for making access decision...
Manachai Toahchoodee, Indrakshi Ray, Kyriakos Anas...
ASSETS
2007
ACM
15 years 1 months ago
WebAnywhere: a screen reader on-the-go
People often use computers other than their own to browse the web, but blind web users are limited in where they access the web because they require specialized, expensive program...
Jeffrey P. Bigham, Craig Prince
83
Voted
ETFA
2008
IEEE
15 years 4 months ago
A secure agent platform for active RFID
RFID are used to identify products in factory automation applications; Multi agent systems are a possibility to introduce flexibility into production processes. This article intro...
Albert Treytl, Werner Spenger, Bilal Riaz
SIGOPS
2010
72views more  SIGOPS 2010»
14 years 8 months ago
Semantic-less coordination of power management and application performance
A computer system often has multiple power management modules controlling different power knobs. Uncoordinated operation of these knobs not only leads to suboptimal operation but ...
Aman Kansal, Jie Liu, Abhishek Singh, Ripal Nathuj...
CHI
2010
ACM
15 years 4 months ago
Bringing the field into focus: user-centered design of a patient expertise locator
Managing personal aspects of health is challenging for many patients, particularly those facing a serious condition such as cancer. Finding experienced patients, who can share the...
Andrea Civan-Hartzler, David W. McDonald, Chris Po...