Sciweavers

662 search results - page 81 / 133
» Adventures in Personalized Information Access
Sort
View
SOSP
2003
ACM
14 years 7 months ago
Decentralized user authentication in a global file system
The challenge for user authentication in a global file system is allowing people to grant access to specific users and groups in remote administrative domains, without assuming ...
Michael Kaminsky, George Savvides, David Mazi&egra...
CHI
2009
ACM
14 years 10 months ago
An evaluation of coordination techniques for protecting objects and territories in tabletop groupware
Indirect input techniques allow users to quickly access all parts of tabletop workspaces without the need for physical access; however, indirect techniques restrict the available ...
David Pinelle, Mutasem Barjawi, Miguel A. Nacenta,...
ICDE
2009
IEEE
119views Database» more  ICDE 2009»
14 years 12 months ago
SmallBlue: Social Network Analysis for Expertise Search and Collective Intelligence
SmallBlue is a social networking application that unlocks the valuable business intelligence of 'who knows what?', 'who knows whom?' and `who knows what about w...
Ching-Yung Lin, Nan Cao, Shixia Liu, Spiros Papadi...
PERCOM
2006
ACM
14 years 9 months ago
The Master Key: A Private Authentication Approach for Pervasive Computing Environments
We propose a novel entity authentication approach for pervasive computing environments. A person uses a single device, the Master Key, which aggregates all his digital forms of ac...
Feng Zhu, Matt W. Mutka, Lionel M. Ni
UM
2009
Springer
14 years 4 months ago
Google Shared. A Case-Study in Social Search
Web search is the dominant form of information access and everyday millions of searches are handled by mainstream search engines, but users still struggle to find what they are lo...
Barry Smyth, Peter Briggs, Maurice Coyle, Michael ...