Sciweavers

1818 search results - page 41 / 364
» How users use access control
Sort
View
IADIS
2004
13 years 10 months ago
Using SPKI/SDSI for Distributed Maintenance of Attribute Release Policies in Shibboleth
The Shibboleth middleware from Internet2 provides a way for users at higher-education institutions to access remote electronic content in compliance with the inter-institutional l...
Sidharth Nazareth, Sean W. Smith
LREC
2010
187views Education» more  LREC 2010»
13 years 10 months ago
How FrameSQL Shows the Japanese FrameNet Data
FrameSQL is a web-based application which the author (Sato, 2003; Sato 2008) created originally for searching the Berkeley FrameNet lexical database. FrameSQL now can handle the J...
Hiroaki Sato
SI3D
2005
ACM
14 years 2 months ago
User interfaces for interactive control of physics-based 3D characters
We present two user interfaces for the interactive control of dynamically-simulated characters. The first interface uses an ‘action palette’ and targets sports prototyping ap...
Peng Zhao, Michiel van de Panne
CSCW
2008
ACM
13 years 10 months ago
The computational geowiki: what, why, and how
Google Maps and its spin-offs are highly successful, but they have a major limitation: users see only pictures of geographic data. These data are inaccessible except by limited ve...
Reid Priedhorsky, Loren G. Terveen
CIKM
2005
Springer
14 years 2 months ago
A function-based access control model for XML databases
XML documents are frequently used in applications such as business transactions and medical records involving sensitive information. Typically, parts of documents should be visibl...
Naizhen Qi, Michiharu Kudo, Jussi Myllymaki, Hamid...