Sciweavers

427 search results - page 75 / 86
» Policies: Giving Users Control over Calls
Sort
View
W4A
2006
ACM
14 years 3 months ago
Dialog generation for voice browsing
In this paper we present our voice browser system, HearSay, which provides efficient access to the World Wide Web to people with visual disabilities. HearSay includes contentbased...
Zan Sun, Amanda Stent, I. V. Ramakrishnan
COMSWARE
2006
IEEE
14 years 3 months ago
WLAN location sharing through a privacy observant architecture
Abstract— In the last few years, WLAN has seen immense growth and it will continue this trend due to the fact that it provides convenient connectivity as well as high speed links...
Kavitha Muthukrishnan, Nirvana Meratnia, Maria Eva...
GLOBECOM
2010
IEEE
13 years 7 months ago
A Tunnel-Aware Language for Network Packet Filtering
While in computer networks the number of possible protocol encapsulations is growing day after day, network administrators face ever increasing difficulties in selecting accurately...
Luigi Ciminiera, Marco Leogrande, Ju Liu, Fulvio R...
TOMS
1998
148views more  TOMS 1998»
13 years 9 months ago
PELLPACK: A Problem-Solving Environment for PDE-Based Applications on Multicomputer Platforms
This paper presents the software architecture and implementation of the problem solving environment (PSE) PELLPACK for modeling physical objects described by partial differential ...
Elias N. Houstis, John R. Rice, Sanjiva Weerawaran...
EDBT
2009
ACM
145views Database» more  EDBT 2009»
14 years 1 months ago
An efficient online auditing approach to limit private data disclosure
In a database system, disclosure of confidential private data may occur if users can put together the answers of past queries. Traditional access control mechanisms cannot guard a...
Haibing Lu, Yingjiu Li, Vijayalakshmi Atluri, Jaid...