Sciweavers

1618 search results - page 121 / 324
» Privacy Interfaces for Information Management
Sort
View
WWW
2010
ACM
14 years 4 months ago
Atomate it! end-user context-sensitive automation using heterogeneous information sources on the web
The transition of personal information management (PIM) tools off the desktop to the Web presents an opportunity to augment these tools with capabilities provided by the wealth o...
Max Van Kleek, Brennan Moore, David R. Karger, Pau...
IHI
2010
126views Healthcare» more  IHI 2010»
13 years 4 months ago
Designing a personal health application for older adults to manage medications
Older adults with multiple chronic conditions are prone to care transitions, such as seeing a new doctor or being discharged after a prolonged hospital stay. These transitions are...
Danish Ullah Khan, Katie A. Siek, Jane Meyers, Lea...
ER
2004
Springer
169views Database» more  ER 2004»
14 years 2 months ago
Intentional Modeling to Support Identity Management
Identity management has arisen as a major and urgent challenge for internet-based communications and information services. Internet services involve complex networks of relationshi...
Lin Liu, Eric S. K. Yu
IEEEARES
2008
IEEE
14 years 3 months ago
Assessing the Reliability and Cost of Web and Grid Orchestrations
Unreliability is a characteristic feature of web and grid based computation: a call to a web or grid site may or may not succeed. An orchestration manager aims to control web or g...
Alan Stewart, Maurice Clint, Terry Harmer, Peter K...
CCS
2010
ACM
13 years 9 months ago
Protecting browsers from cross-origin CSS attacks
Cross-origin CSS attacks use style sheet import to steal confidential information from a victim website, hijacking a user's existing authenticated session; existing XSS defen...
Lin-Shung Huang, Zack Weinberg, Chris Evans, Colli...