Results 1 - 10
of
2,405,819
Understanding and Using Context
- Personal and Ubiquitous Computing
, 2001
"... Context is a poorly used source of information in our computing environments. As a result, we have an impoverished understanding of what context is and how it can be used. In this paper, we provide an operational definition of context and discuss the different ways that context can be used by contex ..."
Abstract
-
Cited by 836 (0 self)
- Add to MetaCart
Context is a poorly used source of information in our computing environments. As a result, we have an impoverished understanding of what context is and how it can be used. In this paper, we provide an operational definition of context and discuss the different ways that context can be used
JFlow: Practical Mostly-Static Information Flow Control
- In Proc. 26th ACM Symp. on Principles of Programming Languages (POPL
, 1999
"... A promising technique for protecting privacy and integrity of sensitive data is to statically check information flow within programs that manipulate the data. While previous work has proposed programming language extensions to allow this static checking, the resulting languages are too restrictive f ..."
Abstract
-
Cited by 579 (32 self)
- Add to MetaCart
for practical use and have not been implemented. In this paper, we describe the new language JFlow, an extension to the Java language that adds statically-checked information flow annotations. JFlow provides several new features that make information flow checking more flexible and convenient than in previous
The Anatomy of a Context-Aware Application
- WIRELESS NETWORKS, VOL
, 1999
"... We describe a platform for context-aware computing which enables applications to follow mobile users as they move around a building. The platform is particularly suitable for richly equipped, networked environments. The only item a user is required to carry is a small sensor tag, which identifies th ..."
Abstract
-
Cited by 532 (3 self)
- Add to MetaCart
them to the system and locates them accurately in three dimensions. The platform builds a dynamic model of the environment using these location sensors and resource information gathered by telemetry software, and presents it in a form suitable for application programmers. Use of the platform
A survey of context-aware mobile computing research
, 2000
"... Context-aware computing is a mobile computing paradigm in which applications can discover and take advantage of contextual information (such as user location, time of day, nearby people and devices, and user activity). Since it was proposed about a decade ago, many researchers have studied this topi ..."
Abstract
-
Cited by 683 (2 self)
- Add to MetaCart
Context-aware computing is a mobile computing paradigm in which applications can discover and take advantage of contextual information (such as user location, time of day, nearby people and devices, and user activity). Since it was proposed about a decade ago, many researchers have studied
Imagined Communities
, 1991
"... This is a field report of a three-week experience in Japan, centered on art education in their cultural and social contexts. Beginning with this overarching focus, the themes and patterns that structure this report were emergent, rising from the experience. Those supporting themes are: being in Japa ..."
Abstract
-
Cited by 802 (5 self)
- Add to MetaCart
This is a field report of a three-week experience in Japan, centered on art education in their cultural and social contexts. Beginning with this overarching focus, the themes and patterns that structure this report were emergent, rising from the experience. Those supporting themes are: being
The Protection of Information in Computer Systems
, 1975
"... This tutorial paper explores the mechanics of protecting computer-stored information from unauthorized use or modification. It concentrates on those architectural structures--whether hardware or software--that are necessary to support information protection. The paper develops in three main sections ..."
Abstract
-
Cited by 815 (2 self)
- Add to MetaCart
of protecting information in computers. Access The ability to make use of information stored in a computer system. Used frequently as a verb, to the horror of grammarians. Access control list A list of principals that are authorized to have access to some object. Authenticate To verify the identity of a person
Controlled and automatic human information processing
- I. Detection, search, and attention. Psychological Review
, 1977
"... A two-process theory of human information processing is proposed and applied to detection, search, and attention phenomena. Automatic processing is activa-tion of a learned sequence of elements in long-term memory that is initiated by appropriate inputs and then proceeds automatically—without subjec ..."
Abstract
-
Cited by 841 (15 self)
- Add to MetaCart
A two-process theory of human information processing is proposed and applied to detection, search, and attention phenomena. Automatic processing is activa-tion of a learned sequence of elements in long-term memory that is initiated by appropriate inputs and then proceeds automatically
Computer support for knowledge-building communities
- The Journal of the Learning Sciences
, 1994
"... Nobody wants to use technology to recreate education as it is, yet there is not much to distinguish what goes on in most computer-supported classrooms versus traditional classrooms. Kay (1991) has suggested that the phenomenon of reframing innovations to recreate the familiar is itself commonplace. ..."
Abstract
-
Cited by 593 (4 self)
- Add to MetaCart
, knowledge content has been processed by the students. In this chapter we offer a suggestion for how to escape the pattern of reinventing the familiar with educational technology. Knowledge-building discourse is at the heart of the superior education that we have in mind. We argue that the classroom needs
Approximate Signal Processing
, 1997
"... It is increasingly important to structure signal processing algorithms and systems to allow for trading off between the accuracy of results and the utilization of resources in their implementation. In any particular context, there are typically a variety of heuristic approaches to managing these tra ..."
Abstract
-
Cited by 516 (2 self)
- Add to MetaCart
It is increasingly important to structure signal processing algorithms and systems to allow for trading off between the accuracy of results and the utilization of resources in their implementation. In any particular context, there are typically a variety of heuristic approaches to managing
Using Linear Algebra for Intelligent Information Retrieval
- SIAM REVIEW
, 1995
"... Currently, most approaches to retrieving textual materials from scientific databases depend on a lexical match between words in users' requests and those in or assigned to documents in a database. Because of the tremendous diversity in the words people use to describe the same document, lexical ..."
Abstract
-
Cited by 672 (18 self)
- Add to MetaCart
Currently, most approaches to retrieving textual materials from scientific databases depend on a lexical match between words in users' requests and those in or assigned to documents in a database. Because of the tremendous diversity in the words people use to describe the same document
Results 1 - 10
of
2,405,819