Sciweavers

653 search results - page 114 / 131
» Addressing interoperability issues in access control models
Sort
View
CHI
2009
ACM
14 years 9 months ago
Timing is everything?: the effects of timing and placement of online privacy indicators
Many commerce websites post privacy policies to address Internet shoppers' privacy concerns. However, few users read or understand them. Iconic privacy indicators may make pr...
Serge Egelman, Janice Y. Tsai, Lorrie Faith Cranor...
CIKM
2009
Springer
14 years 3 months ago
Group-by skyline query processing in relational engines
The skyline operator was first proposed in 2001 for retrieving interesting tuples from a dataset. Since then, 100+ skyline-related papers have been published; however, we discove...
Ming-Hay Luk, Man Lung Yiu, Eric Lo
ICC
2007
IEEE
193views Communications» more  ICC 2007»
14 years 3 months ago
Power-Aware MAC for MultiHop Wireless Networks: A Cross Layer Approach
— This paper addresses the problem of designing a power-aware Multiple Access Control (MAC) protocol for Multihop Wireless Networks (MHWN). The problem is formulated as a cross l...
Abdorasoul Ghasemi, Karim Faez
JUCS
2006
86views more  JUCS 2006»
13 years 9 months ago
Secure Service Discovery based on Trust Management for ad-hoc Networks
Abstract: In ad-hoc networks, mobile devices communicate via wireless links without the aid of any fixed networking infrastructure. These devices must be able to discover services ...
Celeste Campo, Florina Almenárez Mendoza, D...
IUI
2011
ACM
13 years 21 hour ago
Groups without tears: mining social topologies from email
As people accumulate hundreds of “friends” in social media, a flat list of connections becomes unmanageable. Interfaces agnostic to social structure hinder the nuanced sharin...
Diana MacLean, Sudheendra Hangal, Seng Keat Teh, M...