Sciweavers

91 search results - page 13 / 19
» Sentient Computing for Everyone
Sort
View
W4A
2006
ACM
14 years 1 months ago
Personalizable edge services for web accessibility
Web Content Accessibility guidelines by W3C [29] provide several suggestions for Web designers on how to author Web pages in order to make them accessible to everyone. In this con...
Gennaro Iaccarino, Delfina Malandrino, Vittorio Sc...
FC
2005
Springer
149views Cryptology» more  FC 2005»
14 years 1 months ago
Ciphire Mail Email Encryption and Authentication
Abstract. Ciphire Mail is cryptographic software that provides email encryption and digital signatures. The Ciphire Mail client resides on the user's computer between the emai...
Lars Eilebrecht
ICSE
2010
IEEE-ACM
14 years 10 days ago
Customized awareness: recommending relevant external change events
It is often assumed that developers’ view of their system and its environment is always consistent with everyone else’s; in practice, this assumption can be false, as the deve...
Reid Holmes, Robert J. Walker
UM
2001
Springer
13 years 12 months ago
User Modelling in I-Help: What, Why, When and How
This paper describes user modelling in I-Help, a system to facilitate communication amongst learners. There are two I-Help components: Private and Public Discussions. In the Privat...
Susan Bull, Jim E. Greer, Gordon I. McCalla, Lori ...
SP
1989
IEEE
160views Security Privacy» more  SP 1989»
13 years 11 months ago
The Chinese Wall Security Policy
Everyone who has seen the movie Wall Street will have seen a commercial security policy in action. The recent work of Clark and Wilson and the WIPCIS initiative (the Workshop on I...
D. F. C. Brewer, M. J. Nash