Sciweavers

2061 search results - page 282 / 413
» Authorization for Metacomputing Applications
Sort
View
WECWIS
2003
IEEE
125views ECommerce» more  WECWIS 2003»
15 years 9 months ago
A Non-Repudiation Message Transfer Protocol for E-commerce
In the business world, exchange of signatures or receipts is a common practice in case of future dispute. Likewise, it is critical in E-commerce applications to have the security ...
Seokwon Yang, Stanley Y. W. Su, Herman Lam
BIRTHDAY
2003
Springer
15 years 9 months ago
Bounded Fairness
Abstract. Bounded fairness is a stronger notion than ordinary eventuality-based fairness, one that guarantees occurrence of an event within a fixed number of occurrences of anothe...
Nachum Dershowitz, D. N. Jayasimha, Seungjoon Park
121
Voted
CIKM
2003
Springer
15 years 9 months ago
Misuse detection for information retrieval systems
We present a novel approach to detect misuse within an information retrieval system by gathering and maintaining knowledge of the behavior of the user rather than anticipating att...
Rebecca Cathey, Ling Ma, Nazli Goharian, David A. ...
GD
2003
Springer
15 years 9 months ago
Graph Drawing Contest Report
This report describes the the Second Annual Graph Drawing Contest, held in conjunction with the 1995 Graph Drawing Symposium in Passau, Germany. The purpose of the contest is to b...
Franz-Josef Brandenburg, Ulrik Brandes, Peter Eade...
142
Voted
CHI
2010
ACM
15 years 9 months ago
Clutching at straws: using tangible interaction to provide non-visual access to graphs
We present a tangible user interface (TUI) called Tangible Graph Builder, that has been designed to allow visually impaired users to access graph and chart-based data. We describe...
David K. McGookin, Euan Robertson, Stephen A. Brew...