Sciweavers

1818 search results - page 319 / 364
» How users use access control
Sort
View
144
Voted
ATAL
2007
Springer
15 years 4 months ago
InterPol: a policy framework for managing trust and privacy in referral networks
Referral networks are a kind of P2P system consisting of autonomous agents who seek, provide services, or refer other service providers. Key applications include service discovery...
Yathiraj B. Udupi, Munindar P. Singh
125
Voted
BMCBI
2005
137views more  BMCBI 2005»
15 years 2 months ago
ArrayQuest: a web resource for the analysis of DNA microarray data
Background: Numerous microarray analysis programs have been created through the efforts of Open Source software development projects. Providing browser-based interfaces that allow...
Gary L. Argraves, Saurin D. Jani, Jeremy L. Barth,...
139
Voted
MOBISYS
2008
ACM
16 years 2 months ago
Peopletones: a system for the detection and notification of buddy proximity on mobile phones
Mobile phones have the potential to be useful agents for their owners by detecting and reporting situations that are of interest. Several challenges emerge in the case of detectin...
Kevin A. Li, Timothy Sohn, Steven Huang, William G...
134
Voted
VIS
2007
IEEE
128views Visualization» more  VIS 2007»
16 years 4 months ago
Modeling Perceptual Dominance Among Visual Cues in Multilayered Icon-based Scientific Visualizations
ization method is an abstract function that transforms a scientific dataset into a visual representation to facilitate data exploration. In turn, a visualization display is the vis...
Daniel Acevedo, Jian Chen, David H. Laidlaw
134
Voted
CASES
2005
ACM
15 years 4 months ago
SECA: security-enhanced communication architecture
In this work, we propose and investigate the idea of enhancing a System-on-Chip (SoC) communication architecture (the fabric that integrates system components and carries the comm...
Joel Coburn, Srivaths Ravi, Anand Raghunathan, Sri...