Sciweavers

2514 search results - page 97 / 503
» Design, Implementation, and Evaluation of a Digital Lectern ...
Sort
View
AOSD
2005
ACM
15 years 7 months ago
An expressive aspect language for system applications with Arachne
C applications, in particular those using operating system level services, frequently comprise multiple crosscutting concerns: network protocols and security are typical examples ...
Rémi Douence, Thomas Fritz, Nicolas Loriant...
IPSN
2010
Springer
15 years 6 months ago
Ear-phone: an end-to-end participatory urban noise mapping system
A noise map facilitates monitoring of environmental noise pollution in urban areas. It can raise citizen awareness of noise pollution levels, and aid in the development of mitigat...
Rajib Kumar Rana, Chun Tung Chou, Salil S. Kanhere...
105
Voted
DRM
2003
Springer
15 years 6 months ago
Experiences with the enforcement of access rights extracted from ODRL-based digital contracts
In this paper, we present our experiences concerning the enforcement of access rights extracted from ODRL-based digital contracts. We introduce the generalized Contract Schema (Co...
Susanne Guth, Gustaf Neumann, Mark Strembeck
ASSETS
2007
ACM
15 years 5 months ago
Evaluating American Sign Language generation through the participation of native ASL signers
We discuss important factors in the design of evaluation studies for systems that generate animations of American Sign Language (ASL) sentences. In particular, we outline how some...
Matt Huenerfauth, Liming Zhao, Erdan Gu, Jan M. Al...
CMS
2006
175views Communications» more  CMS 2006»
15 years 3 months ago
Attack Graph Based Evaluation of Network Security
Abstract. The perspective directions in evaluating network security are simulating possible malefactor's actions, building the representation of these actions as attack graphs...
Igor V. Kotenko, Mikhail Stepashkin