Sciweavers

1486 search results - page 260 / 298
» Firewall Rules Analysis
Sort
View
IJMMS
2008
131views more  IJMMS 2008»
14 years 11 months ago
Avatars in social media: Balancing accuracy, playfulness and embodied messages
This paper examines how users negotiate their self-presentation via an avatar used in social media. Twenty participants customised an avatar while thinking aloud. An analysis of t...
Asimina Vasalou, Adam N. Joinson, Tanja Bänzi...
CERA
2007
105views more  CERA 2007»
14 years 11 months ago
CAD/CAPP Integration using Feature Ontology
: In a collaborative computer-supported engineering environment, the interoperation of various applications will need a representation that goes beyond the current geometry-based r...
Christel Dartigues, Parisa Ghodous, Michael Grunin...
IANDC
2006
97views more  IANDC 2006»
14 years 11 months ago
Pure bigraphs: Structure and dynamics
Abstract Bigraphs are graphs whose nodes may be nested, representing locality, independently of the edges connecting them. They may be equipped with reaction rules, forming a bigra...
Robin Milner
IJSI
2008
122views more  IJSI 2008»
14 years 11 months ago
Mining Gene Expression Data using Domain Knowledge
Biology is now an information-intensive science and various research areas, like molecular biology, evolutionary biology or environmental biology, heavily depend on the availabilit...
Nicolas Pasquier, Claude Pasquier, Laurent Brisson...
INFORMATICALT
2008
115views more  INFORMATICALT 2008»
14 years 11 months ago
A Fine-Grained Access Control System Combining MAC and RBACK Models for XML
In this paper, we present a novel fine-grained access control system for applications where the information flow is critical; the confidentiality of the data is essential and there...
Mustafa M. Kocatürk, Taflan I. Gündem