Sciweavers

1560 search results - page 235 / 312
» interfaces 2010
Sort
View
SOUPS
2010
ACM
15 years 3 months ago
Optimizing a policy authoring framework for security and privacy policies
Policies which address security and privacy are pervasive parts of both technical and social systems, and technology to enable both organizations and individuals to create and man...
Maritza Johnson, John Karat, Clare-Marie Karat, Ke...
PAKDD
2010
ACM
167views Data Mining» more  PAKDD 2010»
15 years 3 months ago
Resource-Bounded Information Extraction: Acquiring Missing Feature Values on Demand
We present a general framework for the task of extracting specific information “on demand” from a large corpus such as the Web under resource-constraints. Given a database wit...
Pallika Kanani, Andrew McCallum, Shaohan Hu
CHI
2010
ACM
15 years 3 months ago
Artificial subtle expressions: intuitive notification methodology of artifacts
We describe artificial subtle expressions (ASEs) as intuitive notification methodology for artifacts' internal states for users. We prepared two types of audio ASEs; one was ...
Takanori Komatsu, Seiji Yamada, Kazuki Kobayashi, ...
PLDI
2010
ACM
15 years 3 months ago
Composing Parallel Software Efficiently with Lithe
Applications composed of multiple parallel libraries perform poorly when those libraries interfere with one another by obliviously using the same physical cores, leading to destru...
Heidi Pan, Benjamin Hindman, Krste Asanovic
DNIS
2010
Springer
240views Database» more  DNIS 2010»
15 years 3 months ago
AccKW: An Efficient Access Control Scheme for Keyword-Based Search over RDBMS
Access control for relational databases is a well researched area. An SQL query is allowed or denied access to database according to the specified access control policy. On the oth...
Vikram Goyal, Ashish Sureka, Sangeeta Lal