Sciweavers

1818 search results - page 317 / 364
» How users use access control
Sort
View
INTERACT
2003
13 years 10 months ago
Error Resolution Strategies for Interactive Television Speech Interfaces
: Using speech input to augment the remote control can be an alternative interaction technique for interactive television. However, little is known about how to design such a syste...
Aseel Berglund, Pernilla Qvarfordt
WICON
2008
13 years 10 months ago
The effect of cooperation at the network protocol level
Abstract--There has been a great deal of attention on cooperative communication which exploits the spatial diversity among antennas belonging to multiple terminals. Most of the exi...
Beiyu Rong, Anthony Ephremides
WWW
2007
ACM
14 years 9 months ago
Discovering the best web service
Major research challenges in discovering Web services include, provisioning of services across multiple or heterogeneous registries, differentiating between services that share si...
Eyhab Al-Masri, Qusay H. Mahmoud
BMCBI
2008
116views more  BMCBI 2008»
13 years 9 months ago
Gene Ontology annotations: what they mean and where they come from
To address the challenges of information integration and retrieval, the computational genomics community increasingly has come to rely on the methodology of creating annotations o...
David P. Hill, Barry Smith, Monica S. McAndrews-Hi...
SAC
2009
ACM
14 years 3 months ago
SQLProb: a proxy-based architecture towards preventing SQL injection attacks
SQL injection attacks (SQLIAs) consist of maliciously crafted SQL inputs, including control code, used against Databaseconnected Web applications. To curtail the attackers’ abil...
Anyi Liu, Yi Yuan, Duminda Wijesekera, Angelos Sta...