Sciweavers

2926 search results - page 510 / 586
» Document Analysis
Sort
View
JCDL
2009
ACM
115views Education» more  JCDL 2009»
15 years 4 months ago
Using timed-release cryptography to mitigate the preservation risk of embargo periods
Due to temporary access restrictions, embargoed data cannot be refreshed to unlimited parties during the embargo time interval. A solution to mitigate the risk of data loss has be...
Rabia Haq, Michael L. Nelson
EGOV
2007
Springer
15 years 4 months ago
A Trust-Centered Approach for Building E-Voting Systems
eVoting is a challenging approach for increasing eParticipation. However, lack of citizens’ trust seems to be a main obstacle that hinders its successful realization. In this pap...
Athanasios Antoniou, C. Korakas, Christos Manolopo...
BCSHCI
2007
14 years 11 months ago
Interaction designers' use of their repertoire in meetings with clients
An important part of an interaction designer’s work is meeting with clients during design sessions. It is of great importance that the designers participate in establishing some...
Per Sökjer
SSR
2001
69views more  SSR 2001»
14 years 11 months ago
Managing variability in software architectures
This paper presents experience with explicitly managing variability within a software architecture. Software architects normally plan for change and put mechanisms in the architec...
Felix Bachmann, Leonard J. Bass
APWEB
2003
Springer
15 years 1 months ago
A Web User Profiling Approach
People display regularities in almost everything they do. This paper proposes characteristics of an idealized algorithm that would allow an automatic extraction of web user profil ...
Younes Hafri, Chabane Djeraba, Peter L. Stanchev, ...