Sciweavers

579 search results - page 67 / 116
» Access control management for ubiquitous computing
Sort
View
ACMDIS
2008
ACM
15 years 6 months ago
Sharing digital photographs in the home through physical mementos, souvenirs, and keepsakes
People now easily share digital photos outside the home via web publishing and gift-giving. Yet within the home, digital photos are hard to access and lack the physical affordance...
Michael Nunes, Saul Greenberg, Carman Neustaedter
SIGUCCS
2000
ACM
15 years 8 months ago
Computer Abuse, Information Technologies and Judicial Affairs
Crime on the Internet has become a formidable challenge for university information technology and student judicial systems. The nature of university computing requires a relativel...
Elizabeth Mackenzie, Kathryn Goldman
HPDC
1999
IEEE
15 years 9 months ago
Resource Co-Allocation in Computational Grids
Applications designed to execute on "computational grids" frequently require the simultaneous co-allocation of multiple resources in order to meet performance requiremen...
Karl Czajkowski, Ian T. Foster, Carl Kesselman
PDP
2003
IEEE
15 years 10 months ago
A multi-tiered agent-based architecture for a cooperative learning environment
: In this paper the problem of educational resource management in a cooperative learning environment is discussed. A task model was elaborated to determine both functional and leve...
Eduardo Sánchez Vila, Manuel Lama, Ricardo ...
SACMAT
2009
ACM
15 years 11 months ago
Automating role-based provisioning by learning from examples
Role-based provisioning has been adopted as a standard component in leading Identity Management products due to its low administration cost. However, the cost of adjusting existin...
Qun Ni, Jorge Lobo, Seraphin B. Calo, Pankaj Rohat...