Sciweavers

6137 search results - page 175 / 1228
» Securing Collaborative Applications
Sort
View
SIGMOD
2010
ACM
273views Database» more  SIGMOD 2010»
14 years 3 months ago
Google fusion tables: web-centered data management and collaboration
It has long been observed that database management systems focus on traditional business applications, and that few people use a database management system outside their workplace...
Hector Gonzalez, Alon Y. Halevy, Christian S. Jens...
LREC
2010
155views Education» more  LREC 2010»
13 years 11 months ago
Djangology: A Light-weight Web-based Tool for Distributed Collaborative Text Annotation
Manual text annotation is a resource-consuming endeavor necessary for NLP systems when they target new tasks or domains for which there are no existing annotated corpora. Distribu...
Emilia Apostolova, Sean Neilan, Gary An, Noriko To...
ACSAC
2001
IEEE
14 years 1 months ago
Security Policy Enforcement at the File System Level in the Windows NT Operating System Family
This paper describes the implementation of an enforcement module for file system security implemented as part of a security architecture for distributed systems which enforces a c...
Stephen D. Wolthusen
IWEC
2004
13 years 11 months ago
Computer Supported Collaborative Sports: Creating Social Spaces Filled with Sports Activities
We present the newly emerging research field of Computer Supported Collaborative Sports (CSCS). By applying innovative input and output technologies, it enables players to experien...
Volker Wulf, Eckehard F. Moritz, Christian Henneke...
WISTP
2010
Springer
14 years 5 months ago
Secure and Usable Out-Of-Band Channels for Ad Hoc Mobile Device Interactions
Protocols for bootstrapping security in ad hoc mobile device interactions rely on users’ ability to perform specific tasks such as transferring or comparing fingerprints of inf...
Ronald Kainda, Ivan Flechais, A. W. Roscoe