Sciweavers

1627 search results - page 316 / 326
» On context in authorization policy
Sort
View
SIGMOD
2009
ACM
165views Database» more  SIGMOD 2009»
14 years 4 days ago
Query by output
It has recently been asserted that the usability of a database is as important as its capability. Understanding the database schema, the hidden relationships among attributes in t...
Quoc Trung Tran, Chee-Yong Chan, Srinivasan Partha...
DESRIST
2009
Springer
125views Education» more  DESRIST 2009»
14 years 3 days ago
An empirical evaluation of information security awareness levels in designing secure business processes
Information Systems Security (ISS) is critical to ensuring the integrity and credibility of digitally exchanged information in business processes. Information systems development ...
Fergle D'Aubeterre, Lakshmi S. Iyer, Rahul Singh
GD
2001
Springer
13 years 12 months ago
A Short Note on the History of Graph Drawing
The origins of chart graphics (e.g., bar charts and line charts) are well known, with the seminal event being the publication of William Playfair´s (1759-1823) ¨The Commercial a...
Eriola Kruja, Joe Marks, Ann Blair, Richard C. Wat...
SIGGRAPH
2000
ACM
13 years 12 months ago
Tangible interaction + graphical interpretation: a new approach to 3D modeling
Construction toys are a superb medium for creating geometric models. We argue that such toys, suitably instrumented or sensed, could be the inspiration for a new generation of eas...
David B. Anderson, James L. Frankel, Joe Marks, As...
ISIPTA
1999
IEEE
116views Mathematics» more  ISIPTA 1999»
13 years 11 months ago
On the Distribution of Natural Probability Functions
The purpose of this note is to describe the underlying insights and results obtained by the authors, and others, in a series of papers aimed at modelling the distribution of `natu...
Jeff B. Paris, Paul N. Watton, George M. Wilmers