Sciweavers

1818 search results - page 69 / 364
» How users use access control
Sort
View
UAIS
2010
13 years 3 months ago
Auditory universal accessibility of data tables using naturally derived prosody specification
Abstract Text documents usually embody visually oriented meta-information in the form of complex visual structures, such as tables. The semantics involved in such objects result in...
Dimitris Spiliotopoulos, Gerasimos Xydas, Georgios...
GRID
2006
Springer
13 years 9 months ago
Shibboleth-based Access to and Usage of Grid Resources
Security underpins Grids and e-Research. Without a robust, reliable and simple Grid security infrastructure combined with commonly accepted security practices, large portions of th...
Richard O. Sinnott, Jipu Jiang, J. P. Watt, Oluwaf...
OTM
2007
Springer
14 years 3 months ago
MultiBeeBrowse - Accessible Browsing on Unstructured Metadata
Abstract. Growing abundance of information on the Internet, especially the Next Generation Internet, poses even more challenges on more efficient information management; hence it h...
Sebastian Ryszard Kruk, Adam Gzella, Filip Czaja, ...
ERCIMDL
2003
Springer
109views Education» more  ERCIMDL 2003»
14 years 2 months ago
Clustering Top-Ranking Sentences for Information Access
Abstract. In this paper we propose the clustering of top-ranking sentences (TRS) for effective information access. Top-ranking sentences are selected by a query-biased sentence ex...
Anastasios Tombros, Joemon M. Jose, Ian Ruthven
COMCOM
2006
103views more  COMCOM 2006»
13 years 9 months ago
Energy efficiency of collision resolution protocols
Energy consumption of the medium access control (MAC) algorithm is one of the key performance metrics in today's ubiquitous wireless networks of battery-operated devices. We ...
Aran Bergman, Moshe Sidi