Sciweavers

2250 search results - page 135 / 450
» Authorizing applications in singularity
Sort
View
JAPLL
2007
117views more  JAPLL 2007»
14 years 10 months ago
Logic-Based Agent Verification
ecking, algebraic, abstract machines, etc.). THE JOURNAL The Journal of Applied Logic1 publishes papers in areas of logic which can be applied in other disciplines as well as appli...
Michael Fisher, Munindar P. Singh, Diana F. Spears...
CSCW
2012
ACM
13 years 5 months ago
Of joy and gender: emotional expression in online social networks
In this study, we analyzed the language use on Twitter personal exchanges as well as properties of the users’ networks, to study the influence of gender composition on expressio...
Funda Kivran-Swaine, Samuel Brody, Nicholas Diakop...
PET
2012
Springer
13 years 14 days ago
Fault-Tolerant Privacy-Preserving Statistics
Real-time statistics on smart meter consumption data must preserve consumer privacy and tolerate smart meter failures. Existing protocols for this private distributed aggregation m...
Marek Jawurek, Florian Kerschbaum
JSS
2002
90views more  JSS 2002»
14 years 9 months ago
Visual requirement representation
Most software development errors are caused by incorrect or ambiguous requirement specifications gathered during the requirement elicitation and analysis phase. For the past decad...
Deng-Jyi Chen, Wu-Chi Chen, Krishna M. Kavi
CHI
2009
ACM
15 years 10 months ago
Supporting the creation of hybrid museum experiences
This paper presents the evolution of a tool to support the rapid prototyping of hybrid museum experiences by domain professionals. The developed tool uses visual markers to associ...
Boriana Koleva, Stefan Rennick Egglestone, Holger ...