Sciweavers

1818 search results - page 158 / 364
» How users use access control
Sort
View
WECWIS
2009
IEEE
142views ECommerce» more  WECWIS 2009»
14 years 4 months ago
DySCon: Dynamic Sharing Control for Distributed Team Collaboration in Networked Enterprises
– Networked enterprises create virtual teams of distributed experts belonging to different enterprises where one user can be part of multiple teams; How to effectively control th...
Ahmad Kamran Malik, Hong Linh Truong, Schahram Dus...
BMCBI
2005
134views more  BMCBI 2005»
13 years 9 months ago
Inherited disorder phenotypes: controlled annotation and statistical analysis for knowledge mining from gene lists
Background: Analysis of inherited diseases and their associated phenotypes is of great importance to gain knowledge of underlying genetic interactions and could ultimately give cl...
Marco Masseroli, Osvaldo Galati, Mauro Manzotti, K...
ESSOS
2010
Springer
14 years 6 months ago
Automatic Generation of Smart, Security-Aware GUI Models
In many software applications, users access application data using graphical user interfaces (GUIs). There is an important, but little explored, link between visualization and secu...
David A. Basin, Manuel Clavel, Marina Egea, Michae...
OHS
2001
Springer
14 years 2 months ago
METIOREW: An Objective Oriented Content Based and Collaborative Recommending System
The size of Internet has been growing very fast and many documents appear every day in the Net. Users find many problems to obtain the information that they really need. In order t...
David Bueno, Ricardo Conejo, Amos David
MSR
2005
ACM
14 years 3 months ago
SCQL: a formal model and a query language for source control repositories
Source Control Repositories are used in most software projects to store revisions to source code files. These repositories operate at the file level and support multiple users. ...
Abram Hindle, Daniel M. Germán