Sciweavers

7379 search results - page 1355 / 1476
» How Many Clusters
Sort
View
CASSIS
2005
Springer
14 years 4 months ago
The Architecture of a Privacy-Aware Access Control Decision Component
Today many interactions are carried out online through Web sites and e-services and often private and/or sensitive information is required by service providers. A growing concern r...
Claudio Agostino Ardagna, Marco Cremonini, Ernesto...
CCS
2005
ACM
14 years 4 months ago
CPOL: high-performance policy evaluation
Policy enforcement is an integral part of many applications. Policies are often used to control access to sensitive information. Current policy specification languages give users ...
Kevin Borders, Xin Zhao, Atul Prakash
DIGRA
2005
Springer
14 years 4 months ago
'Feel It, Don't Think: the Significance of Affect in the Study of Digital Games
Game studies methodologies which focus on the visual, narrative, and semiotic content of digital games overlook the way that embodied perception and physiological response contrib...
Eugenie Shinkle
ESWS
2005
Springer
14 years 4 months ago
Web Explanations for Semantic Heterogeneity Discovery
Managing semantic heterogeneity is a complex task. One solution involves matching like terms to each other. We view Match as an operator that takes two graph-like structures (e.g....
Pavel Shvaiko, Fausto Giunchiglia, Paulo Pinheiro ...
GD
2005
Springer
14 years 4 months ago
D-Dupe: An Interactive Tool for Entity Resolution in Social Networks
Visualizing and analyzing social networks is a challenging problem that has been receiving growing attention. An important first step, before analysis can begin, is ensuring that...
Mustafa Bilgic, Louis Licamele, Lise Getoor, Ben S...
« Prev « First page 1355 / 1476 Last » Next »