Sciweavers

871 search results - page 150 / 175
» A Decentralized Authorization Architecture
Sort
View
CII
2007
73views more  CII 2007»
14 years 9 months ago
Competency characterisation by means of work situation modelling
Nowadays companies have to face the rapid evolution of their competitive environment. In the field of design, project managers are aware of both the impact of the designers’ com...
Farouk Belkadi, Eric Bonjour, Maryvonne Dulmet
COMSIS
2007
80views more  COMSIS 2007»
14 years 9 months ago
"Security of Computer Systems and Networks" Book Preview
This paper presents preview of the new book titled “Security of Computer Systems and Networks” (original in Serbian language “Sigurnost računarskih sistema i mreža”) – ...
Dragan Pleskonjic, Nemanja Macek, Borislav Djordje...
JWSR
2008
147views more  JWSR 2008»
14 years 9 months ago
Karma2: Provenance Management for Data-Driven Workflows
: The increasing ability for the sciences to sense the world around us is resulting in a growing need for data driven applications that are under the control of workflows composed ...
Yogesh L. Simmhan, Beth Plale, Dennis Gannon
FCSC
2007
108views more  FCSC 2007»
14 years 9 months ago
Offline Chinese handwriting recognition: an assessment of current technology
Offline Chinese handwriting recognition (OCHR) is a typically difficult pattern recognition problem. Many authors have presented various approaches to recognizing its different asp...
Sargur N. Srihari, Xuanshen Yang, Gregory R. Ball
OIR
2007
123views more  OIR 2007»
14 years 9 months ago
The IP's guide to the galaxy of portal planning: part III - administrative framework
Purpose – This article is the third in a four-part series that aims to illustrate the process involved in planning a portal and creating a portal definition document. Design/me...
Amy M. Finley, Rebecca H. Augustyniak