Sciweavers

366 search results - page 59 / 74
» Access Policy Design Supported by FCA Methods
Sort
View
KES
2005
Springer
14 years 2 months ago
User Preference Learning for Multimedia Personalization in Pervasive Computing Environment
Pervasive computing environment and users’ demand for multimedia personalization precipitate a need for personalization tools to help people access desired multimedia content at ...
Zhiwen Yu, Daqing Zhang, Xingshe Zhou, Changde Li
MHCI
2009
Springer
14 years 3 months ago
Automatic mobile menu customization based on user operation history
Mobile devices are becoming more and more difficult to use due to the sheer number of functions now supported. In this paper, we propose a menu customization system that ranks fun...
Yusuke Fukazawa, Mirai Hara, Masashi Onogi, Hideto...
BIODATAMINING
2008
120views more  BIODATAMINING 2008»
13 years 8 months ago
Filling the gap between biology and computer science
This editorial introduces BioData Mining, a new journal which publishes research articles related to advances in computational methods and techniques for the extraction of useful ...
Jesús S. Aguilar-Ruiz, Jason H. Moore, Mary...
CCS
2007
ACM
14 years 2 months ago
Alpaca: extensible authorization for distributed services
Traditional Public Key Infrastructures (PKI) have not lived up to their promise because there are too many ways to define PKIs, too many cryptographic primitives to build them wi...
Chris Lesniewski-Laas, Bryan Ford, Jacob Strauss, ...
CIDR
2009
167views Algorithms» more  CIDR 2009»
13 years 9 months ago
Unbundling Transaction Services in the Cloud
The traditional architecture for a DBMS engine has the recovery, concurrency control and access method code tightly bound together in a storage engine for records. We propose a di...
David B. Lomet, Alan Fekete, Gerhard Weikum, Micha...