Sciweavers

1818 search results - page 306 / 364
» How users use access control
Sort
View
CSCW
2008
ACM
13 years 12 months ago
The microstructures of social tagging: a rational model
This article presents a rational model developed under the distributed cognition framework that explains how social tags influence knowledge acquisition and adaptation in explorat...
Wai-Tat Fu
DLOG
2004
13 years 11 months ago
Towards Explaining Semantic Matching
Interoperability among systems using different term vocabularies requires mappings between them. Matching applications generate these mappings. When the matching process utilizes ...
Deborah L. McGuinness, Pavel Shvaiko, Fausto Giunc...
VIS
2007
IEEE
181views Visualization» more  VIS 2007»
14 years 11 months ago
Shadow-Driven 4D Haptic Visualization
Just as we can work with two-dimensional floor plans to communicate 3D architectural design, we can exploit reduced-dimension shadows to manipulate the higher-dimensional objects ...
Hui Zhang, Andrew J. Hanson
VLDB
1999
ACM
162views Database» more  VLDB 1999»
14 years 2 months ago
Active Views for Electronic Commerce
Electronic commerce is emerging as a major Websupported application. In this paper we argue that database technology can, and should, provide the backbone for a wide range of such...
Serge Abiteboul, Bernd Amann, Sophie Cluet, Anat E...
ICSM
2009
IEEE
14 years 4 months ago
A combinatorial approach to building navigation graphs for dynamic web applications
Modeling the navigation structure of a dynamic web application is a challenging task because of the presence of dynamic pages. In particular, there are two problems to be dealt wi...
Wenhua Wang, Yu Lei, Sreedevi Sampath, Raghu Kacke...