Sciweavers

196 search results - page 29 / 40
» A Hacking View of Access Control
Sort
View
OZCHI
2006
ACM
14 years 3 months ago
Beyond security: implications for the future of federated digital identity management systems
Federated identity management is often viewed by corporations as a solution to support secure online commerce by synthesising complex and fragmented user information into a single...
Christine Satchell, Graeme G. Shanks, Steve Howard...
KDD
2012
ACM
247views Data Mining» more  KDD 2012»
12 years 3 days ago
Integrating meta-path selection with user-guided object clustering in heterogeneous information networks
Real-world, multiple-typed objects are often interconnected, forming heterogeneous information networks. A major challenge for link-based clustering in such networks is its potent...
Yizhou Sun, Brandon Norick, Jiawei Han, Xifeng Yan...
SAC
2009
ACM
14 years 2 months ago
Towards "WYDIWYS" for MIMI using concept analysis
This paper presents a novel software engineering approach for developing a dynamic web interface that meets the quality criterion of “WYDIWYS” - What You Do Is What You See. T...
Jie Dai, Remo Mueller, Jacek Szymanski, Guo-Qiang ...
MICCAI
2004
Springer
14 years 10 months ago
Enhancement of Visual Realism with BRDF for Patient Specific Bronchoscopy Simulation
Abstract. This paper presents a novel method for photorealistic rendering of the bronchial lumen by directly deriving matched shading and texture parameters from video bronchoscope...
Adrian James Chung, Fani Deligianni, Pallav Shah, ...
ICWS
2009
IEEE
14 years 6 months ago
Mobile In-store Personalized Services
: © Mobile In-Store Personalized Services Jun Li, Ismail Ari, Jhilmil Jain, Alan H. Karp, Mohamed; Dekhil HP Laboratories HPL-2009-48 mobile shopping assistant, cross-organization...
Jun Li, Ismail Ari, Jhilmil Jain, Alan H. Karp, Mo...