Sciweavers

1057 search results - page 199 / 212
» The Carrot Approach: Encouraging Use of Location Systems
Sort
View
CCS
2005
ACM
15 years 5 months ago
Automatic placement of authorization hooks in the linux security modules framework
We present a technique for automatic placement of authorization hooks, and apply it to the Linux security modules (LSM) framework. LSM is a generic framework which allows diverse ...
Vinod Ganapathy, Trent Jaeger, Somesh Jha
AIS
2004
Springer
15 years 5 months ago
Integrated Term Weighting, Visualization, and User Interface Development for Bioinformation Retrieval
This project implements an integrated biological information website that classifies technical documents, learns about users' interests, and offers intuitive interactive visua...
Min Hong, Anis Kairmpour-fard, Steve Russell, Lawr...
CG
2004
Springer
14 years 11 months ago
ANTS--Augmented Environments
When interacting with natural or urban environments there are many situations where the ability to access data in real time becomes relevant. Augmented Reality (AR) technologies a...
Teresa Romão, Nuno Correia, A. Eduardo Dias...
WWW
2005
ACM
16 years 12 days ago
A convenient method for securely managing passwords
Computer users are asked to generate, keep secret, and recall an increasing number of passwords for uses including host accounts, email servers, e-commerce sites, and online finan...
J. Alex Halderman, Brent Waters, Edward W. Felten
CIKM
2005
Springer
15 years 5 months ago
A function-based access control model for XML databases
XML documents are frequently used in applications such as business transactions and medical records involving sensitive information. Typically, parts of documents should be visibl...
Naizhen Qi, Michiharu Kudo, Jussi Myllymaki, Hamid...