Sciweavers

2411 search results - page 49 / 483
» Information Integration in Service-oriented Computing
Sort
View
102
Voted
SP
1987
IEEE
118views Security Privacy» more  SP 1987»
15 years 5 months ago
A Comparison of Commercial and Military Computer Security Policies
Most discussions of computer security focus on control of disclosure. In Particular, the U.S. Department of Defense has developed a set of criteria for computer mechanisms to prov...
D. D. Clark, D. R. Wilson
102
Voted
ESORICS
2005
Springer
15 years 7 months ago
Quantifying Probabilistic Information Flow in Computational Reactive Systems
Information flow and non-interference are well-established techniques for expressing both integrity and privacy properties. Because of the enormous potential to transmit informati...
Michael Backes
JAR
1998
134views more  JAR 1998»
15 years 1 months ago
Integrating Computer Algebra into Proof Planning
Mechanized reasoning systems and computer algebra systems have different objectives. Their integration is highly desirable, since formal proofs often involve both of the two differ...
Manfred Kerber, Michael Kohlhase, Volker Sorge
BC
2005
127views more  BC 2005»
15 years 1 months ago
Computational modeling and exploration of contour integration for visual saliency
Abstract Weproposeacomputationalmodelofcontourintegration for visual saliency. The model uses biologically plausible devices to simulate how the representations of elements aligned...
T. Nathan Mundhenk, Laurent Itti
CHI
2004
ACM
16 years 2 months ago
"Stuff goes into the computer and doesn't come out": a cross-tool study of personal information management
This paper reports a study of Personal Information Management (PIM), which advances research in two ways: (1) rather than focusing on one tool, we collected cross-tool data relati...
Richard Boardman, Martina Angela Sasse