Sciweavers

1627 search results - page 254 / 326
» On context in authorization policy
Sort
View
JCDL
2005
ACM
162views Education» more  JCDL 2005»
14 years 2 months ago
Integrating digital libraries and electronic publishing in the DART project
The Digital Anthropology Resources for Teaching (DART) project integrates the content acquisition and cataloging initiatives of a federated digital repository with the development...
Gordon Dahlquist, Brian Hoffman, David Millman
WWW
2005
ACM
14 years 2 months ago
An information extraction engine for web discussion forums
In this poster, we present an information extraction engine for web-based forums. The engine analyzes the HTML files crawled from web forums, deduces the wrapper (template) of the...
Hanny Yulius Limanto, Nguyen Ngoc Giang, Vo Tan Tr...
CONCUR
2005
Springer
14 years 2 months ago
Deriving Weak Bisimulation Congruences from Reduction Systems
The focus of process calculi is interaction rather than computation, and for this very reason: (i) their operational semantics is conveniently expressed by labelled transition syst...
Roberto Bruni, Fabio Gadducci, Ugo Montanari, Pawe...
ICCSA
2005
Springer
14 years 2 months ago
On AAA with Extended IDK in Mobile IP Networks
Mobile IP proposed by IETF supports continuous services for a mobile node (MN) based on its capability to roam around foreign domains [1]. Recently the rapid growth of wireless tec...
Hoseong Jeon, Min Young Chung, Hyunseung Choo
NORDICHI
2004
ACM
14 years 2 months ago
Six modes of proactive resource management: a user-centric typology for proactive behaviors
Proactivity has recently arisen as one of the focus areas within HCI. Proactive systems adhere to two premises: 1) working on behalf of, or pro, the user, and 2) acting on their o...
Antti Salovaara, Antti Oulasvirta