Sciweavers

1818 search results - page 247 / 364
» How users use access control
Sort
View
EWCBR
2008
Springer
15 years 6 months ago
Realising a CBR-based approach for Computer Cooking Contest with e: IAS
Abstract. This paper describes a web-based CBR application competing at the first Computer Cooking Contest at the ECCBR 2008. It describes the technical realisation of our system, ...
Alexandre Hanft, Norman Ihle, Kerstin Bach, R&eacu...
EUROSYS
2008
ACM
16 years 1 months ago
Application-level isolation and recovery with solitude
When computer systems are compromised by an attack, it is difficult to determine the precise extent of the damage caused by the attack because the state changes made by an attack...
Shvetank Jain, Fareha Shafique, Vladan Djeric, Ash...
JSAC
2010
122views more  JSAC 2010»
15 years 2 months ago
A hybrid reservation/contention-based MAC for video streaming over wireless networks
—To reserve or not for bursty video traffic over wireless access networks has been a long-debated issue. For uplink transmissions in infrastructure-based wireless networks and p...
Ruonan Zhang, Rukhsana Ruby, Jianping Pan, Lin Cai...
DEXA
2009
Springer
173views Database» more  DEXA 2009»
15 years 11 months ago
Incremental Ontology-Based Extraction and Alignment in Semi-structured Documents
SHIRI 1 is an ontology-based system for integration of semistructured documents related to a specific domain. The system’s purpose is to allow users to access to relevant parts ...
Mouhamadou Thiam, Nacéra Bennacer, Nathalie...
EKAW
2004
Springer
15 years 9 months ago
Semantic Webs for Learning: A Vision and Its Realization
Abstract. Augmenting web pages with semantic contents, i.e., building a ‘Semantic Web’, promises a number of benefits for web users in general and learners in particular. Seman...
Arthur Stutt, Enrico Motta