Sciweavers

6885 search results - page 1305 / 1377
» The micro-structure of use of help
Sort
View
SACMAT
2009
ACM
14 years 4 months ago
Symbolic reachability analysis for parameterized administrative role based access control
Role based access control (RBAC) is a widely used access control paradigm. In large organizations, the RBAC policy is managed by multiple administrators. An administrative role ba...
Scott D. Stoller, Ping Yang, Mikhail I. Gofman, C....
SIGIR
2009
ACM
14 years 4 months ago
Dynamicity vs. effectiveness: studying online clustering for scatter/gather
We proposed and implemented a novel clustering algorithm called LAIR2, which has constant running time average for on-the-fly Scatter/Gather browsing [4]. Our experiments showed ...
Weimao Ke, Cassidy R. Sugimoto, Javed Mostafa
UIST
2009
ACM
14 years 4 months ago
Changing how people view changes on the web
The Web is a dynamic information environment. Web content changes regularly and people revisit Web pages frequently. But the tools used to access the Web, including browsers and s...
Jaime Teevan, Susan T. Dumais, Daniel J. Liebling,...
AGILEDC
2008
IEEE
14 years 4 months ago
Mature Agile with a Twist of CMMI
Systematic is an agile company working at CMMI level 5, where the default way of working is based on Scrum and story based early testing development. Solid experiences in combinin...
Carsten Ruseng Jakobsen, Kent Aaron Johnson
FGR
2008
IEEE
227views Biometrics» more  FGR 2008»
14 years 4 months ago
Ambient intelligence as the bridge to the future of pervasive computing
One prediction about this future of pervasive technology is that people will carry the tools needed to interface with technological resources sprinkled through out the environment...
Christopher Richard Wren, Yuri A. Ivanov
« Prev « First page 1305 / 1377 Last » Next »