Sciweavers

1554 search results - page 111 / 311
» An Overview of the Spring System
Sort
View
273
Voted

Lecture Notes
404views
17 years 2 months ago
Network Security
A comprehensive treatment of network security. Topics include remote access security, DMZ, firewalls, VPNs, PKI architecture, X.509 Public key infrastructure, web security, S-HTTP,...
Raj Jain
EUROMICRO
1999
IEEE
15 years 8 months ago
Processing Requirements by Software Configuration Management
Short development life cycles, the importance of timeto-market and fast changes in technology influence the requirements engineering process. Requirements are exposed to changes d...
Ivica Crnkovic, Peter J. Funk, Magnus Larsson
PRICAI
2004
Springer
15 years 10 months ago
K2: Animated Agents that Understand Speech Commands and Perform Actions
This paper presents a prototype dialogue system, K2, in which a user can instruct agents through speech input to manipulate various objects in a 3-D virtual world. The agents’ ac...
Takenobu Tokugana, Kotaro Funakoshi, Hozumi Tanaka
HICSS
2003
IEEE
102views Biometrics» more  HICSS 2003»
15 years 9 months ago
Trust in Electronic Environments
The objective of this paper is to provide a unified, theoretically grounded framework for trust in electronic environments. An overview of the research on trust is presented, exam...
Kari Chopra, William A. Wallace
158
Voted
SAC
1997
ACM
15 years 8 months ago
Query Planning in Infomaster
Infomaster is an information integration system. It provides integrated access to distributed, heterogeneous information sources, thus giving its users the illusion of a centraliz...
Oliver M. Duschka, Michael R. Genesereth