Sciweavers

3000 search results - page 140 / 600
» Accessing an Information System by Chatting
Sort
View
PRICAI
2004
Springer
14 years 2 months ago
A New Collaborative Recommender System Addressing Three Problems
Abstract. With the development of e-commerce and information access, a large amount of information can be found online, which makes a good recommendation service to be urgently nec...
Byeong Man Kim, Qing Li, Jong-Wan Kim, Jinsoo Kim
IH
1998
Springer
14 years 1 months ago
The Steganographic File System
Abstract. Users of some systems are at risk of being compelled to disclose their keys or other private data, and this risk could be mitigated if access control mechanisms supported...
Ross J. Anderson, Roger M. Needham, Adi Shamir
MUE
2008
IEEE
103views Multimedia» more  MUE 2008»
14 years 3 months ago
Ubiquitous Web Access: Collaborative Optimization and Dynamic Content Negotiation
Traditionally, cellular wide area networks like UMTS are used as Internet access networks for particular users but, in some cases, they can be employed to provide Internet access ...
Xavier Sanchez-Loro, Victoria Beltran, Jordi Casad...
VTC
2010
IEEE
162views Communications» more  VTC 2010»
13 years 7 months ago
Cognitive Radio Enabled Multi-Channel Access for Vehicular Communications
—The IEEE 1609.4 standard has been proposed to provide multi-channel operations in wireless access for vehicular environments (WAVE), where all the channels are periodically sync...
Jui-Hung Chu, Kai-Ten Feng, Chen-Nee Chuah, Chin-F...
DBSEC
2006
115views Database» more  DBSEC 2006»
13 years 10 months ago
Creating Objects in the Flexible Authorization Framework
Access control is a crucial concern to build secure IT systems and, more specifically, to protect the confidentiality of information. However, access control is necessary, but not ...
Nicola Zannone, Sushil Jajodia, Duminda Wijesekera