Sciweavers

1688 search results - page 88 / 338
» Access Control to Information in Pervasive Computing Environ...
Sort
View
CCS
2007
ACM
15 years 10 months ago
Incremental adaptation of XPath access control views
Materialized XPath access-control views are commonly used for enforcing access control. When access control rules defining a materialized XML access-control view change, the view...
Padmapriya Ayyagari, Prasenjit Mitra, Dongwon Lee,...
LISA
1994
15 years 5 months ago
The Group Administration Shell and the GASH Network Computing Environment
Managing large scale UNIX networks so that users can use resources on multiple systems is traditionally performed using NIS, NFS, and DNS. Proper use of these tools requires exact...
Jonathan Abbey
ICMI
2000
Springer
171views Biometrics» more  ICMI 2000»
15 years 8 months ago
Gaze and Speech in Attentive User Interfaces
The trend toward pervasive computing necessitates finding and implementing appropriate ways for users to interact with devices. We believe the future of interaction with pervasive ...
Paul P. Maglio, Teenie Matlock, Christopher S. Cam...
INTERSENSE
2006
ACM
15 years 10 months ago
QoS-aware mesh construction to enhance multicast routing in mobile ad hoc networks
— Mobile Ad-hoc Networks (MANETs) are seen as an essential technology to support future Pervasive Computing Scenarios and 4G networks. In a MANET, efficient support of multipoint...
Harald Tebbe, Andreas J. Kassler, Pedro M. Ruiz
IDS
1994
128views Database» more  IDS 1994»
15 years 8 months ago
Virtual Environments for Data Sharing and Visualisation - Populated Information Terrains
The Concept of Populated Information Terrains (PITS) aims to extend database technology with key ideas from the new fields of Virtual Reality (VR) and Computer Supported Cooperativ...
Steve Benford, John A. Mariani