Sciweavers

1818 search results - page 337 / 364
» How users use access control
Sort
View
IUI
2012
ACM
12 years 4 months ago
A visual programming language for designing interactions embedded in web-based geographic applications
Visual programming languages (VPLs) provide notations for representing both the intermediate and the final results of a knowledge engineering process. Whereas some VPLs particula...
The Nhan Luong, Patrick Etcheverry, Christophe Mar...
IMC
2009
ACM
14 years 3 months ago
Network level footprints of facebook applications
With over half a billion users, Online Social Networks (OSNs) are the major new applications on the Internet. Little information is available on the network impact of OSNs, althou...
Atif Nazir, Saqib Raza, Dhruv Gupta, Chen-Nee Chua...
LCN
2006
IEEE
14 years 3 months ago
Utility-based Packet Scheduler for Wireless Communications
Abstract— Following widespread availability of wireless Internet, a wide range of applications with differing QoS requirements must share the wireless access. The objective of th...
Ana Aguiar, Adam Wolisz, Horst Lederer
ESWS
2008
Springer
13 years 10 months ago
Contextual and Metadata-based Approach for the Semantic Annotation of Heterogeneous Documents
We present SHIRI-Annot an automatic ontology-driven and unsupervised approach for the semantic annotation of documents which contain well structured parts and not well structured o...
Mouhamadou Thiam, Nathalie Pernelle, Nacéra...
AVI
2010
13 years 10 months ago
iChase: supporting exploration and awareness of editing activities on Wikipedia
To increase its credibility and preserve the trust of its readers, Wikipedia needs to ensure a good quality of its articles. To that end, it is critical for Wikipedia administrato...
Nathalie Henry Riche, Bongshin Lee, Fanny Chevalie...