Sciweavers

758 search results - page 94 / 152
» User Control over User Adaptation: A Case Study
Sort
View
153
Voted
FGCS
2007
125views more  FGCS 2007»
15 years 3 months ago
An autonomic tool for building self-organizing Grid-enabled applications
In this paper we present CAMELotGrid, a tool to manage Grid computations of Cellular Automata that support the efficient simulation of complex systems modeled by a very large numb...
Gianluigi Folino, Giandomenico Spezzano
124
Voted
PUC
2008
117views more  PUC 2008»
15 years 3 months ago
The disenchantment of affect
: In computing design, experience is often broken down, compartmentalized, and engineered: a process that often disenchants the original experience. In this paper, we demonstrate t...
Phoebe Sengers, Kirsten Boehner, Michael Mateas, G...
145
Voted
PERVASIVE
2007
Springer
15 years 9 months ago
Operating Appliances with Mobile Phones - Strengths and Limits of a Universal Interaction Device
Abstract. Mobile phones are increasingly becoming ubiquitous computational devices that are almost always available, individually adaptable, and nearly universally connectable (usi...
Christof Roduner, Marc Langheinrich, Christian Flo...
168
Voted
CODASPY
2011
14 years 7 months ago
Relationship-based access control: protection model and policy language
Social Network Systems pioneer a paradigm of access control that is distinct from traditional approaches to access control. Gates coined the term Relationship-Based Access Control...
Philip W. L. Fong
140
Voted
SACMAT
2009
ACM
15 years 10 months ago
Symbolic reachability analysis for parameterized administrative role based access control
Role based access control (RBAC) is a widely used access control paradigm. In large organizations, the RBAC policy is managed by multiple administrators. An administrative role ba...
Scott D. Stoller, Ping Yang, Mikhail I. Gofman, C....