Sciweavers

1627 search results - page 257 / 326
» On context in authorization policy
Sort
View
METRICS
2002
IEEE
14 years 1 months ago
A Generic Model and Tool Support for Assessing and Improving Web Processes
Process assessment or process improvement is usually not considered in the context of Web applications, and the differences between Web applications and traditional applications a...
Daniel Rodríguez, Rachel Harrison, Manoranj...
WMTE
2002
IEEE
14 years 1 months ago
Environmental Detectives: PDAs as a Window into a Virtual Simulated World
The use of computer simulations is changing the nature of scientific investigation and providing us unique insights into the way that the world works. As simulation moves from the...
Eric Klopfer, Kurt Squire, Henry Jenkins
CHI
2009
ACM
14 years 1 months ago
Passive photography from a creative perspective: "If I would just shoot the same thing for seven days, it's like... What's the p
This paper aims to contribute with an understanding of meaningful experiences of photography, to support reflection upon the design of future camera devices. We have conducted a s...
Sara Ljungblad
HUC
2009
Springer
14 years 1 months ago
Ubicomp4D: infrastructure and interaction for international development--the case of urban indian slums
This paper attempts to re-imagine ubiquitous computing for populations in low-income and information-challenged environments. We examine information infrastructures in midsized ur...
Nithya Sambasivan, Nimmi Rangaswamy, Ed Cutrell, B...
ACSAC
2000
IEEE
14 years 1 months ago
A Novel Approach to On-Line Status Authentication of Public-Key Certificates
The widespread use of public networks, such as the Internet, for the exchange of sensitive data, like legally valid documents and business transactions, poses severe security cons...
Eugenio Faldella, Marco Prandini