Sciweavers

3712 search results - page 550 / 743
» Role-Based Access Control
Sort
View
128
Voted
CHI
2010
ACM
15 years 9 months ago
Factors impeding Wiki use in the enterprise: a case study
Our research explored factors that impacted the use of wikis as a tool to support the dissemination of knowledge within an enterprise. Although we primarily talked to a population...
Lester J. Holtzblatt, Laurie E. Damianos, Daniel W...
135
Voted
CCS
2010
ACM
15 years 9 months ago
A logic for authorization provenance
In distributed environments, statements from a number of principals, besides the central trusted party, may influence the derivations of authorization decisions. However, existin...
Jinwei Hu, Yan Zhang, Ruixuan Li, Zhengding Lu
122
Voted
CCGRID
2009
IEEE
15 years 9 months ago
Self-Tuning Virtual Machines for Predictable eScience
— Unpredictable access to batch-mode HPC resources is a significant problem for emerging dynamic data-driven applications. Although efforts such as reservation or queue-time pred...
Sang-Min Park, Marty Humphrey
GLOBECOM
2009
IEEE
15 years 9 months ago
Modeling and Characterizing User Experience in a Cloud Server Based Mobile Gaming Approach
—With the evolution of mobile devices and networks, and the growing trend of mobile Internet access, rich, multi-player gaming using mobile devices, similar to PC-based Internet ...
Shaoxuan Wang, Sujit Dey
GLOBECOM
2009
IEEE
15 years 9 months ago
Robust Cooperative Relaying in a Wireless LAN: Cross-Layer Design and Performance Analysis
—A key technology in cooperative communications is distributed space-time coding (DSTC) which achieves spatial diversity gain from multiple relays. A novel DSTC, called randomize...
Pei Liu, Chun Nie, Elza Erkip, Shivendra S. Panwar