Sciweavers

986 search results - page 155 / 198
» Who are the Internet Content Providers
Sort
View
ISW
2009
Springer
14 years 2 months ago
Hardware-Assisted Application-Level Access Control
Abstract. Applications typically rely on the operating system to enforce access control policies such as MAC, DAC, or other policies. However, in the face of a compromised operatin...
Yu-Yuan Chen, Ruby B. Lee
SIGMOD
2009
ACM
168views Database» more  SIGMOD 2009»
14 years 8 months ago
Database research in computer games
This tutorial presents an overview of the data management issues faced by computer games today. While many games do not use databases directly, they still have to process large am...
Alan J. Demers, Johannes Gehrke, Christoph Koch, B...
SIGIR
2008
ACM
13 years 7 months ago
Information access to cultural heritage
The workshop on Information Access to Cultural Heritage (IACH 2008) was held during the ECDL conference in Aarhus on the 18th September 2008. The workshop provided a venue to brin...
Martha Larson, Kate Fernie, Johan Oomen, Juan Migu...
BMCBI
2004
110views more  BMCBI 2004»
13 years 7 months ago
Tools for loading MEDLINE into a local relational database
Background: Researchers who use MEDLINE for text mining, information extraction, or natural language processing may benefit from having a copy of MEDLINE that they can manage loca...
Diane E. Oliver, Gaurav Bhalotia, Ariel S. Schwart...
UIST
2010
ACM
13 years 5 months ago
Mixture model based label association techniques for web accessibility
An important aspect of making the Web accessible to blind users is ensuring that all important web page elements such as links, clickable buttons, and form fields have explicitly ...
Muhammad Asiful Islam, Yevgen Borodin, I. V. Ramak...