Sciweavers

596 search results - page 98 / 120
» Theories of Access Consciousness
Sort
View
92
Voted
ELPUB
1998
ACM
15 years 3 months ago
Evolving Ecological Niches: Technological Change and the Transformation of the Libraries Role in Publishing
Print has been the most significant scholarly communication technology for the last three hundred years (at least). Kaufer and Carley’s Ecology of Communicative Transactions ana...
Andrew E. Treloar
133
Voted
CIKM
1997
Springer
15 years 3 months ago
Analysis and Design of Server Informative WWW-Sites
The access patterns of the users of a web-site are traditionally analyzed in order to facilitate the user access to the site's information. In this study, however, a systemat...
Amir M. Zarkesh, Jafar Adibi, Cyrus Shahabi, Reza ...
166
Voted
STOC
1993
ACM
264views Algorithms» more  STOC 1993»
15 years 3 months ago
Contention in shared memory algorithms
Most complexity measures for concurrent algorithms for asynchronous shared-memory architectures focus on process steps and memory consumption. In practice, however, performance of ...
Cynthia Dwork, Maurice Herlihy, Orli Waarts
CCS
2006
ACM
15 years 2 months ago
Beyond separation of duty: an algebra for specifying high-level security policies
A high-level security policy states an overall requirement for a sensitive task. One example of a high-level security policy is a separation of duty policy, which requires a sensi...
Ninghui Li, Qihua Wang
119
Voted
ATAL
2008
Springer
15 years 28 days ago
On the importance of migration for fairness in online grid markets
Computational grids offer users a simple access to tremendous computer resources for solving large scale computing problems. Traditional performance analysis of scheduling algorit...
Lior Amar, Ahuva Mu'alem, Jochen Stößer