Sciweavers

1818 search results - page 304 / 364
» How users use access control
Sort
View
GECCO
2009
Springer
148views Optimization» more  GECCO 2009»
14 years 4 months ago
An evolutionary approach to constructive induction for link discovery
This paper presents a genetic programming-based symbolic regression approach to the construction of relational features in link analysis applications. Specifically, we consider t...
Tim Weninger, William H. Hsu, Jing Xia, Waleed Alj...
HICSS
2005
IEEE
150views Biometrics» more  HICSS 2005»
14 years 3 months ago
Collaborative Authoring on the Web: A Genre Analysis of Online Encyclopedias
This paper presents the results of a genre analysis of two web-based collaborative authoring environments, Wikipedia and Everything2, both of which are intended as repositories of...
William G. Emigh, Susan C. Herring
CSFW
1999
IEEE
14 years 2 months ago
Secure Composition of Insecure Components
Software systems are becoming heterogeneous: instead of a small number of large programs from well-established sources, a user's desktop may now consist of many smaller compo...
Peter Sewell, Jan Vitek
UIST
1997
ACM
14 years 2 months ago
CyberDesk: A Framework for Providing Self-Integrating Ubiquitous Software Services
Current software suites suffer from problems due to poor integration of their individual tools. They require the designer to think of all possible integrating behaviours and leave...
Anind K. Dey, Gregory D. Abowd, Mike Pinkerton, An...
CORR
2008
Springer
98views Education» more  CORR 2008»
13 years 10 months ago
Information Acquisition and Exploitation in Multichannel Wireless Networks
A wireless system with multiple channels is considered, where each channel has several transmission states. A user learns about the instantaneous state of an available channel by ...
Sudipto Guha, Kamesh Munagala, Saswati Sarkar