Sciweavers

1627 search results - page 248 / 326
» On context in authorization policy
Sort
View
CHI
2004
ACM
14 years 9 months ago
Acquiring in situ training data for context-aware ubiquitous computing applications
Ubiquitous, context-aware computer systems may ultimately enable computer applications that naturally and usefully respond to a user's everyday activity. Although new algorit...
Stephen S. Intille, Ling Bao, Emmanuel Munguia Tap...
RECOMB
2004
Springer
14 years 9 months ago
Chromosomal breakpoint re-use in the inference of genome sequence rearrangement
In order to apply gene-order rearrangement algorithms to the comparison of genome sequences, Pevzner and Tesler [9] bypass gene finding and ortholog identification, and use the or...
David Sankoff, Phil Trinh
PERCOM
2006
ACM
14 years 8 months ago
Composition Trust Bindings in Pervasive Computing Service Composition
In pervasive computing, devices or peers may implement or compose services using services from other devices or peers, and may use components from various sources. A composition t...
John Buford, Rakesh Kumar, Greg Perkins
IUI
2009
ACM
14 years 5 months ago
Have a say over what you see: evaluating interactive compression techniques
We all encounter many documents on a daily basis that we do not have time to process in their entirety. Nevertheless, we lack good tools to rapidly skim and identify key informati...
Simon Tucker, Steve Whittaker
IUI
2009
ACM
14 years 5 months ago
Rich interfaces for reading news on the web
Using content-specific models to guide information retrieval and extraction can provide richer interfaces to endusers for both understanding the context of news events and navigat...
Earl J. Wagner, Jiahui Liu, Larry Birnbaum, Kennet...