Sciweavers

3334 search results - page 623 / 667
» Using User Models in Music Information Retrieval Systems
Sort
View
MOBILITY
2009
ACM
14 years 1 months ago
Context-sensitive authorization in interaction patterns
Main requirement of recent computing environments, like mobile and then ubiquitous computing, is to adapt applications to context. On the other hand, access control generally trus...
Vincent Hourdin, Jean-Yves Tigli, Stephane Lavirot...
MM
2006
ACM
181views Multimedia» more  MM 2006»
14 years 2 months ago
Peer-to-peer multimedia applications
In both academia and industry, peer-to-peer (P2P) applications have attracted great attention. Peer-to-peer file sharing applications, such as Napster, Gnutella, Kazaa, BitTorrent...
Jin Li
ITNG
2007
IEEE
14 years 3 months ago
Software Reuse: Research and Practice
— It has been almost four decades since the idea of software reuse was proposed. Many success stories have been told, yet it is believed that software reuse is still in the devel...
Sajjan G. Shiva, Lubna Abou Shala
SACMAT
2009
ACM
14 years 3 months ago
A semantic web based framework for social network access control
The existence of on-line social networks that include person specific information creates interesting opportunities for various applications ranging from marketing to community o...
Barbara Carminati, Elena Ferrari, Raymond Heatherl...
WSC
1998
13 years 10 months ago
Simulation Optimization Research and Development
Simulation optimization is rapidly becoming a mainstream tool for simulation practitioners. Simulation optimization is the practice of linking an optimization method with a simula...
Royce Bowden, John D. Hall