Sciweavers

2648 search results - page 340 / 530
» Human Factors In Computer Security
Sort
View
GROUP
2007
ACM
15 years 7 months ago
The story of a working workflow management system
This work presents experiences with the adopting of a workflow management system in a large financial institution. We describe the gradual evolution of a traditional work process,...
Steen Brahe, Kjeld Schmidt
SIGCSE
2008
ACM
136views Education» more  SIGCSE 2008»
15 years 3 months ago
A new paradigm for programming competitions
The annual ACM International Collegiate Programming Contest produces a competitive paradigm that is at odds with the pedagogical goals of modern computer science and software engi...
James F. Bowring
135
Voted
LAWEB
2009
IEEE
15 years 10 months ago
Policy Based Protection and Personalized Generation of Web Content
Abstract—The World Wide Web offers easy sharing of information, but provides only few options for the protection of sensitive information and other sensitive resources. Tradition...
Sergej Zerr, Daniel Olmedilla, Juri Luca De Coi, W...
TIP
2008
165views more  TIP 2008»
15 years 3 months ago
Activity Modeling Using Event Probability Sequences
Changes in motion properties of trajectories provide useful cues for modeling and recognizing human activities. We associate an event with significant changes that are localized in...
Naresh P. Cuntoor, B. Yegnanarayana, Rama Chellapp...
PDPTA
2004
15 years 4 months ago
Semantic Extensions for the Virtual Enterprise's Grid Infastructure
Construction activities take place in what can be called a dynamic virtual organization (VO). VOs require a secure, reliable, scalable information infrastructure that allows collab...
Ziga Turk, Vlado Stankovski, Matevz Dolenc, Tomo C...