Sciweavers

1818 search results - page 286 / 364
» How users use access control
Sort
View
IUI
2005
ACM
14 years 3 months ago
ScentHighlights: highlighting conceptually-related sentences during reading
Researchers have noticed that readers are increasingly skimming instead of reading in depth. Skimming also occur in re-reading activities, where the goal is to recall specific top...
Ed Huai-hsin Chi, Lichan Hong, Michelle Gumbrecht,...
NETWORK
2006
218views more  NETWORK 2006»
13 years 10 months ago
Quality of service for packet telephony over mobile ad hoc networks
IP telephony over mobile ad hoc networks is a topic of emerging interest in the research arena as one of the paths toward the fixed-mobile convergence in telecommunications networ...
Paolo Giacomazzi, Luigi Musumeci, Giuseppe Caizzon...
HOTOS
1999
IEEE
14 years 2 months ago
Elephant: The File System That Never Forgets
Modern file systems associate the deletion of a file with the release of the storage associated with that file, and file writes with the irrevocable change of file contents. We pr...
Douglas J. Santry, Michael J. Feeley, Norman C. Hu...
SIGOPSE
1990
ACM
14 years 2 months ago
A replicated Unix file system
u s e s t h e p r i m a r y c o p y r e p l i c a t i o nAbstract technique [1, 26, 27]. In this method, client calls are directed to a single primary server, which communicatesThi...
Barbara Liskov, Robert Gruber, Paul Johnson, Liuba...
JODL
2007
109views more  JODL 2007»
13 years 10 months ago
Examining topic shifts in content-oriented XML retrieval
Abstract. Content-oriented XML retrieval systems support access to XML repositories by retrieving, in response to user queries, XML document components (XML elements) instead of wh...
Elham Ashoori, Mounia Lalmas, Theodora Tsikrika