Sciweavers

565 search results - page 51 / 113
» A logic for authorization provenance
Sort
View
CHI
2005
ACM
14 years 9 months ago
From creating virtual gestures to "writing" in sign languages
Sign languages have been proven to be natural languages, as capable of expressing human thoughts and emotions as traditional languages are. The distinct visual and spatial nature ...
Beifang Yi, Frederick C. Harris Jr., Sergiu M. Das...
CHI
2004
ACM
14 years 9 months ago
IM here: public instant messaging on large, shared displays for workgroup interactions
Instant messaging (IM) in the workplace has proven to be a valuable tool for facilitating informal communication. Its benefits, however, are generally limited to times when users ...
Elaine M. Huang, Daniel M. Russell, Alison E. Sue
IEEEARES
2010
IEEE
14 years 3 months ago
Solving the Transitive Access Problem for the Services Oriented Architecture
: © Solving the Transitive Access Problem for the Services Oriented Architecture Alan H. Karp, Jun Li HP Laboratories HPL-2008-204R1 SOA, web services, access control, RBAC, PBAC,...
Alan H. Karp, Jun Li
CHI
2009
ACM
14 years 3 months ago
Matchin: eliciting user preferences with an online game
Eliciting user preferences for large datasets and creating rankings based on these preferences has many practical applications in community-based sites. This paper gives a new met...
Severin Hacker, Luis von Ahn
ICDM
2009
IEEE
112views Data Mining» more  ICDM 2009»
14 years 3 months ago
Resolving Identity Uncertainty with Learned Random Walks
A pervasive problem in large relational databases is identity uncertainty which occurs when multiple entries in a database refer to the same underlying entity in the world. Relati...
Ted Sandler, Lyle H. Ungar, Koby Crammer