Sciweavers

1425 search results - page 255 / 285
» The combined ISAC-ER methodology of information systems deve...
Sort
View
ACMACE
2007
ACM
15 years 1 months ago
Tangible interfaces for real-time 3D virtual environments
Emergent game formats, such as machinima, that use game worlds as expressive 3D performance spaces have new expressive powers with an increase of the quality of their underlying g...
Ali Mazalek, Michael Nitsche
VLDB
1995
ACM
112views Database» more  VLDB 1995»
15 years 1 months ago
OPOSSUM: Desk-Top Schema Management through Customizable Visualization
Several recent trends have changed the usage and users of schemas beyond those of a database administrator’s tool for describing database contents. Distribution of computing pow...
Eben M. Haber, Yannis E. Ioannidis, Miron Livny
DEBS
2007
ACM
14 years 11 months ago
Identification of suspicious, unknown event patterns in an event cloud
This paper describes an approach to detect unknown event patterns. In this context, an event is not only something that happens, but also something that can be analysed. This task...
Alexander Widder, Rainer von Ammon, Philippe Schae...
INFOCOM
2010
IEEE
14 years 8 months ago
ISP-Enabled Behavioral Ad Targeting without Deep Packet Inspection
—Online advertising is a rapidly growing industry currently dominated by the search engine ’giant’ Google. In an attempt to tap into this huge market, Internet Service Provid...
Gabriel Maciá-Fernández, Yong Wang, ...
CCS
2005
ACM
15 years 3 months ago
Automated trust negotiation using cryptographic credentials
In automated trust negotiation (ATN), two parties exchange digitally signed credentials that contain attribute information to establish trust and make access control decisions. Be...
Jiangtao Li, Ninghui Li, William H. Winsborough