Sciweavers

6593 search results - page 1181 / 1319
» Integrated Learning Architectures
Sort
View
136
Voted
IEEECIT
2010
IEEE
15 years 2 months ago
Enabling Privacy-preserving Credential-based Access Control with XACML and SAML
—In this paper we describe extensions to the access control industry standards XACML and SAML to enable privacy-preserving and credential-based access control. Rather than assumi...
Claudio Agostino Ardagna, Sabrina De Capitani di V...
131
Voted
JUCS
2010
97views more  JUCS 2010»
15 years 2 months ago
Usage-based Object Similarity
: Recommender systems are widely used online to support users in finding relevant information. They can be based on different techniques such as content-based and collaborative ...
Katja Niemann, Maren Scheffel, Martin Friedrich, U...
ACMIDC
2010
15 years 2 months ago
vSked: an interactive visual schedule system for use in classrooms for children with autism
Children with autism often experience substantial challenges in understanding, structuring, and predicting the activities in their daily lives. The use of symbols to represent a s...
Michael T. Yeganyan, Meg Cramer, Lou Anne Boyd, Gi...
150
Voted
FIS
2010
15 years 2 months ago
Managing On-Demand Business Applications with Hierarchical Service Level Agreements
Business applications are facing an increasing demand for being delivered as on-demand services. Service Level Agreements (SLAs) are a common way for specifying the exact condition...
Wolfgang Theilmann, Ulrich Winkler, Jens Happe, Il...
IPPS
2010
IEEE
15 years 2 months ago
Offline library adaptation using automatically generated heuristics
Automatic tuning has emerged as a solution to provide high-performance libraries for fast changing, increasingly complex computer architectures. We distinguish offline adaptation (...
Frédéric de Mesmay, Yevgen Voronenko...
« Prev « First page 1181 / 1319 Last » Next »