Sciweavers

270 search results - page 33 / 54
» Authorization of User Profile Access in Identity Management
Sort
View
SAINT
2005
IEEE
14 years 1 months ago
A Context-centric Security Middleware for Service Provisioning in Pervasive Computing
Pervasive user mobility, wireless connectivity and the widespread diffusion of portable devices raise new challenges for ubiquitous service provisioning. An emerging architecture ...
Antonio Corradi, Rebecca Montanari, Daniela Tibald...
IUI
2009
ACM
14 years 4 months ago
Detecting and correcting user activity switches: algorithms and interfaces
The TaskTracer system allows knowledge workers to define a set of activities that characterize their desktop work. It then associates with each user-defined activity the set of ...
Jianqiang Shen, Jed Irvine, Xinlong Bao, Michael G...
JODI
2010
115views more  JODI 2010»
13 years 2 months ago
ICE-Theorem - End to end semantically aware eResearch infrastructure for theses
: ICE-TheOREM was a project which made several important contributions to the repository domain, promoting deposit by integrating the repository with authoring workflows and enhanc...
Peter Sefton, Jim Downing
GRID
2006
Springer
13 years 7 months ago
Using Workflow for Dynamic Security Context Management in Grid-based Applications
This paper presents ongoing research and current results on the development of flexible access control infrastructures for complex resource provisioning in Grid-based collaborativ...
Yuri Demchenko, Leon Gommans, Cees de Laat, Arie T...
CHI
2011
ACM
12 years 11 months ago
Roboshop: multi-layered sketching interface for robot housework assignment and management
As various home robots come into homes, the need for efficient robot task management tools is arising. Current tools are designed for controlling individual robots independently, ...
Kexi Liu, Daisuke Sakamoto, Masahiko Inami, Takeo ...