Sciweavers

92 search results - page 9 / 19
» Is Context-Aware Computing Taking Control away from the User
Sort
View
133
Voted
MOBISYS
2009
ACM
16 years 4 months ago
xShare: supporting impromptu sharing of mobile phones
Loaded with personal data, e.g. photos, contacts, and call history, mobile phones are truly personal devices. Yet it is often necessary or desirable to share our phones with other...
Yunxin Liu, Ahmad Rahmati, Yuanhe Huang, Hyukjae J...
COLCOM
2008
IEEE
15 years 10 months ago
Access Control Model for Sharing Composite Electronic Health Records
The adoption of electronically formatted medical records, so called Electronic Health Records (EHRs), has become extremely important in healthcare systems to enable the exchange of...
Jing Jin, Gail-Joon Ahn, Michael J. Covington, Xin...
133
Voted
DASFAA
2010
IEEE
176views Database» more  DASFAA 2010»
15 years 4 months ago
Efficient Database-Driven Evaluation of Security Clearance for Federated Access Control of Dynamic XML Documents
Achieving data security over cooperating web services is becoming a reality, but existing XML access control architectures do not consider this federated service computing. In this...
Erwin Leonardi, Sourav S. Bhowmick, Mizuho Iwaihar...
135
Voted
TIDSE
2004
Springer
15 years 9 months ago
A System to Compose Movies for Cross-Cultural Storytelling: Textable Movie
Abstract. This paper presents Textable Movie, an open-ended interface that allows anyone to become "video-jockey." In the framework of computational storytelling, Textabl...
Catherine Vaucelle, Glorianna Davenport
106
Voted
CHI
2005
ACM
16 years 4 months ago
Interrupted cognition and design for non-disruptiveness: the skilled memory approach
Interruptions have gained in importance as a topic in current HCI research. Through a series of experiments, we take a step toward analyzing the active role of human memory in con...
Antti Oulasvirta