Sciweavers

1818 search results - page 82 / 364
» How users use access control
Sort
View
FUN
2010
Springer
263views Algorithms» more  FUN 2010»
14 years 1 months ago
Fighting Censorship with Algorithms
In countries such as China or Iran where Internet censorship is prevalent, users usually rely on proxies or anonymizers to freely access the web. The obvious difficulty with this a...
Mohammad Mahdian
CASCON
1996
140views Education» more  CASCON 1996»
13 years 10 months ago
Improving cohesiveness and flexibility in systems management architectures using distributed object technologies over the intern
Management applications are sensitive to changes in application and system configuration. This coupling makes it difficult and expensive to develop management applications and kee...
Asham El Rayess, Vidar Vetland, Jerome A. Rolia, J...
SNPD
2003
13 years 10 months ago
Using a Semantic Web for Process Information and Quality Management
This paper describes an approach (and its implementation) on how to handle the large number of data from user centered engineering processes. It uses objectoriented abstraction me...
Ronald Hartwig
SDMW
2007
Springer
14 years 3 months ago
Query Rewriting Algorithm Evaluation for XML Security Views
Abstract. We investigate the experimental effectiveness of query rewriting over XML security views. Our model consists of access control policies specified over DTDs with XPath e...
Nataliya Rassadko
PRESENCE
1998
98views more  PRESENCE 1998»
13 years 8 months ago
The Virtual Venue: User-Computer Interaction in Information-Rich Virtual Environments
We present a virtual environment application that allows users to access embedded information within an immersive virtual space. Due to the richness and complexity of this environ...
Doug A. Bowman, Larry F. Hodges, Jay David Bolter