Sciweavers

1818 search results - page 289 / 364
» How users use access control
Sort
View
VSMM
2007
Springer
14 years 4 months ago
Adding Semantic Annotations, Navigation Paths and Tour Guides to Existing Virtual Environments
Nowadays, more Virtual Environments (VEs) are becoming available on the Web. This means that VEs are becoming accessible to a larger and more diverse audience. It also means that i...
Frederic Kleinermann, Olga De Troyer, Christophe C...
INFOCOM
2003
IEEE
14 years 3 months ago
Improving Web Performance in Broadcast-Unicast Networks
— Satellite operators have recently begun offering Internet access over their networks. Typically, users connect to the network using a modem for uplink, and a satellite dish for...
Mukesh Agrawal, Amit Manjhi, Nikhil Bansal, Sriniv...
WAIM
2001
Springer
14 years 2 months ago
Link Based Clustering of Web Search Results
Abstract. With information proliferation on the Web, how to obtain highquality information from the Web has been one of hot research topics in many fields like Database, IR as well...
Yitong Wang, Masaru Kitsuregawa
CCGRID
2001
IEEE
14 years 1 months ago
Replica Selection in the Globus Data Grid
The Globus Data Grid architecture provides a scalable infrastructure for the management of storage resources and data that are distributed across Grid environments. These services...
Sudharshan Vazhkudai, Steven Tuecke, Ian T. Foster
SAC
2002
ACM
13 years 9 months ago
Proxy-based security protocols in networked mobile devices
We describe a resource discovery and communication system designed for security and privacy. All objects in the system, e.g., appliances, wearable gadgets, software agents, and us...
Matt Burnside, Dwaine E. Clarke, Todd Mills, Andre...