Sciweavers

3000 search results - page 74 / 600
» Accessing an Information System by Chatting
Sort
View
WWW
2011
ACM
13 years 4 months ago
Low-infrastructure methods to improve internet access for mobile users in emerging regions
As information technology supports more aspects of modern life, digital access has become an important tool for developing regions to lift themselves from poverty. Though broadban...
Sibren Isaacman, Margaret Martonosi
SIGMOD
2010
ACM
155views Database» more  SIGMOD 2010»
13 years 7 months ago
Search in social networks with access control
More and more important data is accumulated inside social networks. Limiting the flow of private information across a social network is very important, and most social networks pr...
Truls Amundsen Bjørklund, Michaela Göt...
HOTOS
1999
IEEE
14 years 1 months ago
The Case for Efficient File Access Pattern Modeling
Most modern I/O systems treat each file access independently. However, events in a computer system are driven by programs. Thus, accesses to files occur in consistent patterns and...
Tom M. Kroeger, Darrell D. E. Long
SAC
2002
ACM
13 years 8 months ago
Benefits of document maps for text access in knowledge management: a comparative study
Analyzing, structuring and organizing documented knowledge is an important aspect of knowledge management. In order to ease the access to text collections, in literature so-called...
Andreas Becks, Christian Seeling, Ralf Minkenberg
CCS
2004
ACM
14 years 2 months ago
KNOW Why your access was denied: regulating feedback for usable security
We examine the problem of providing useful feedback about access control decisions to users while controlling the disclosure of the system’s security policies. Relevant feedback...
Apu Kapadia, Geetanjali Sampemane, Roy H. Campbell