Sciweavers

1818 search results - page 97 / 364
» How users use access control
Sort
View
ICDE
2010
IEEE
246views Database» more  ICDE 2010»
14 years 9 months ago
Admission Control Mechanisms for Continuous Queries in the Cloud
Abstract--Amazon, Google, and IBM now sell cloud computing services. We consider the setting of a for-profit business selling data stream monitoring/management services and we inve...
Alexandros Labrinidis, Christine Chung, Kirk Pruhs...
EACL
1989
ACL Anthology
13 years 10 months ago
User studies and the design of Natural Language Systems
This paper presents a critical discussion of the various approaches that have been used in the evaluation of Natural Language systems. We conclude that previous approaches have ne...
Steve Whittaker, Phil Stenton
SOSP
1997
ACM
13 years 10 months ago
A Decentralized Model for Information Flow Control
This paper presents a new model for controlling information flow in systems with mutual distrust and decentralized authority. The model allows users to share information with dis...
Andrew C. Myers, Barbara Liskov
GIS
2008
ACM
14 years 10 months ago
Charting new ground: modeling user behavior in interactive geovisualization
Geovisualization has traditionally played a critical role in analysis and decision-making, but recent developments have also brought a revolution in widespread online access to ge...
David C. Wilson, Heather Richter Lipford, Erin Car...
ISCA
1998
IEEE
114views Hardware» more  ISCA 1998»
14 years 24 days ago
Tempest and Typhoon: User-Level Shared Memory
Future parallel computers must efficiently execute not only hand-coded applications but also programs written in high-level, parallel programming languages. Today's machines ...
Steven K. Reinhardt, James R. Larus, David A. Wood