Sciweavers

652 search results - page 103 / 131
» Deriving Specifications of Dependable Systems: toward a Meth...
Sort
View
ETRICS
2006
15 years 1 months ago
Policy-Based Integration of User and Provider-Sided Identity Management
Abstract. Depending on whether the users or the providers are performing it, Identity Management (IM) traditionally has different meanings. For users, IM means to choose between on...
Wolfgang Hommel
TKDE
2008
116views more  TKDE 2008»
14 years 9 months ago
Long-Term Cross-Session Relevance Feedback Using Virtual Features
Relevance feedback (RF) is an iterative process, which refines the retrievals by utilizing the user's feedback on previously retrieved results. Traditional RF techniques solel...
Peng-Yeng Yin, Bir Bhanu, Kuang-Cheng Chang, Anlei...
ELECTRONICMARKETS
2010
124views more  ELECTRONICMARKETS 2010»
14 years 7 months ago
The difficulty of studying inter-organisational IS phenomena on large scales: critical reflections on a research journey
We argue that certain theoretical commitments that underpin much existing Interorganisational Information Systems (IOIS) research at small scales become untenable when IOIS are st...
Kai Reimers, Robert B. Johnston, Stefan Klein
ACL
2011
14 years 1 months ago
Joint Annotation of Search Queries
Marking up search queries with linguistic annotations such as part-of-speech tags, capitalization, and segmentation, is an important part of query processing and understanding in ...
Michael Bendersky, W. Bruce Croft, David A. Smith
ICST
2009
IEEE
15 years 4 months ago
Transforming and Selecting Functional Test Cases for Security Policy Testing
In this paper, we consider typical applications in which the business logic is separated from the access control logic, implemented in an independent component, called the Policy ...
Tejeddine Mouelhi, Yves Le Traon, Benoit Baudry