Sciweavers

1285 search results - page 230 / 257
» Information systems revisited - the general continuous case
Sort
View
EWSPT
2003
Springer
15 years 7 months ago
Providing Highly Automated and Generic Means for Software Deployment Process
We present a new approach for the management and enactment of deployment process by a deployment processor ORYA (Open enviRonment to deploY Applications). ORYA aims to integrate te...
Vincent Lestideau, Noureddine Belkhatir
ICS
2003
Tsinghua U.
15 years 7 months ago
AEGIS: architecture for tamper-evident and tamper-resistant processing
We describe the architecture for a single-chip aegis processor which can be used to build computing systems secure against both physical and software attacks. Our architecture ass...
G. Edward Suh, Dwaine E. Clarke, Blaise Gassend, M...
HRI
2006
ACM
15 years 8 months ago
Interaction debugging: an integral approach to analyze human-robot interaction
Along with the development of interactive robots, controlled experiments and field trials are regularly conducted to stage human-robot interaction. Experience in this field has sh...
Tijn Kooijmans, Takayuki Kanda, Christoph Bartneck...
SIGIR
2003
ACM
15 years 7 months ago
Evaluating different methods of estimating retrieval quality for resource selection
In a federated digital library system, it is too expensive to query every accessible library. Resource selection is the task to decide to which libraries a query should be routed....
Henrik Nottelmann, Norbert Fuhr
CIKM
2010
Springer
15 years 16 days ago
Building re-usable dictionary repositories for real-world text mining
Text mining, though still a nascent industry, has been growing quickly along with the awareness of the importance of unstructured data in business analytics, customer retention an...
Shantanu Godbole, Indrajit Bhattacharya, Ajay Gupt...