Sciweavers

298 search results - page 35 / 60
» E-Learning Environments: An Integrated View
Sort
View
WISA
2007
Springer
15 years 5 months ago
A Compositional Multiple Policies Operating System Security Model
Multilevel security policies aim at only confidentiality assurance, with less consideration on integrity assurance and weakness in expressing channel control policies. Besides, the...
Lei Xia, Wei Huang, Hao Huang
ICRA
2006
IEEE
128views Robotics» more  ICRA 2006»
15 years 5 months ago
Probabilistic Location Recognition using Reduced Feature Set
Abstract— The localization capability is central to basic navigation tasks and motivates development of various visual navigation systems. In this paper we describe a two stage a...
Fayin Li, Jana Kosecka
IPPS
2006
IEEE
15 years 5 months ago
Checkpointing and rollback-recovery protocol for mobile systems with MW session guarantee
In the mobile environment, weak consistency replication of shared data is the key to obtaining high data availability, good access performance, and good scalability. Therefore new...
Jerzy Brzezinski, Anna Kobusinska, Michal Szychowi...
SIGSOFT
2006
ACM
15 years 5 months ago
Using task context to improve programmer productivity
When working on a large software system, a programmer typically spends an inordinate amount of time sifting through thousands of artifacts to find just the subset of information n...
Mik Kersten, Gail C. Murphy
EMISA
2009
Springer
15 years 6 months ago
Access Control for Monitoring System-Spanning Business Processes in Proviado
: Integrated process support is highly desirable in environments where data related to a particular (business) process are scattered over distributed, heterogeneous information sys...
Sarita Bassil, Manfred Reichert, Ralph Bobrik