Sciweavers

1615 search results - page 121 / 323
» What's new
Sort
View
CHI
1997
ACM
14 years 1 months ago
How to Personalize the Web
Agents can personalize otherwise impersonal computational systems. The World Wide Web presents the same appearance to every user regardless of that user’s past activity. Web Bro...
Rob Barrett, Paul P. Maglio, Daniel C. Kellem
GROUP
1997
ACM
14 years 1 months ago
NYNEX portholes: initial user reactions and redesign implications
The prevalence of audio and video options on computers, coupled with the promise of bandwidth, have many prognosticators predicting a revolution in human communications. But what ...
Alison Lee, Andreas Girgensohn, Kevin Schlueter
SP
1996
IEEE
140views Security Privacy» more  SP 1996»
14 years 1 months ago
A Security Model of Dynamic Labeling Providing a Tiered Approach to Verification
In the proposed mandatory access control model, arbitrary label changing policies can be expressed. The relatively simple model can capture a wide variety of security policies, in...
Simon N. Foley, Li Gong, Xiaolei Qian
CIKM
1993
Springer
14 years 1 months ago
Model-driven Hypermedia Access to Weather Information
: A framework is presented for hypermedia access to weather information originating from gridded data sets. The information is presented on different media (map, text, graph, table...
Stephan M. Kerpedjiev
ICSE
1992
IEEE-ACM
14 years 1 months ago
The Use of Program Dependence Graphs in Software Engineering
This paper describes a language-independent program representation--the program dependence graph--and discusses how program dependence graphs, together with operations such as pro...
Susan Horwitz, Thomas W. Reps