Sciweavers

708 search results - page 43 / 142
» Implementing access control to people location information
Sort
View
UIST
1998
ACM
13 years 12 months ago
Informative Things: How to Attach Information to the Real World
We describe a new method and implementation for managing information through the use of physical objects. In today’s networked world, the trend is toward working in a global vir...
Rob Barrett, Paul P. Maglio
ICIP
2003
IEEE
14 years 9 months ago
Top-down control of visual attention in object detection
Current computational models of visual attention focus on bottom-up information and ignore scene context. However, studies in visual cognition show that humans use context to faci...
Aude Oliva, Antonio B. Torralba, Monica S. Castelh...
IFIP
2003
Springer
14 years 28 days ago
Dynamic Device Access for Mobile Users
The Dynamic Device Association (DDA) framework presented in this paper provides service discovery and secure device access for mobile users. We discuss scenarios and requirements f...
Dirk Kutscher, Jörg Ott
ACSAC
2000
IEEE
14 years 4 days ago
Secure Compartmented Data Access over an Untrusted Network using a COTS-based Architecture
In this paper, we present an approach to secure compartmented data access over an untrusted network using a secure network computing architecture. We describe the architecture and...
P. C. Clark, M. C. Meissner, K. O. Vance
CHI
2009
ACM
14 years 8 months ago
Lightweight tagging expands information and activity management practices
Could people use tagging to manage day-to-day work in their personal computing environment? Could tagging be sufficiently generic and lightweight to support diverse ways of workin...
Gerard Oleksik, Max L. Wilson, Craig S. Tashman, E...