Sciweavers

569 search results - page 56 / 114
» Intent Specifications: An Approach to Building Human-Centere...
Sort
View
ICWS
2004
IEEE
15 years 1 months ago
Access Control for Semantic Web Services
In this paper we make a contribution to the proof and trust layer of the Semantic Web layer cake by integrating two well founded techniques, namely DAML-S (for describing Web serv...
Sudhir Agarwal, Barbara Sprick
DELOS
2000
15 years 1 months ago
Challenging Ubiquitous Inverted Files
Stand-alone ranking systems based on highly optimized inverted file structures are generally considered `the' solution for building search engines. Observing various developm...
Arjen P. de Vries
AAAI
1997
15 years 1 months ago
Navigation and Planning in a Mixed-Initiative User Interface
Mixed-initiative planning is one approach to building an intelligent decision-making environment. A mixedinitiative system shares decision-making responsibility with the user such...
Robert St. Amant
IFIP
2009
Springer
14 years 9 months ago
Model Checking of Security-Sensitive Business Processes
Security-sensitive business processes are business processes that must comply with security requirements (e.g. authorization constraints). In previous works it has been shown that ...
Alessandro Armando, Serena Elisa Ponta
CCS
2007
ACM
15 years 3 months ago
Reconfigurable trusted computing in hardware
Trusted Computing (TC) is an emerging technology towards building trustworthy computing platforms. The Trusted Computing Group (TCG) has proposed several specifications to impleme...
Thomas Eisenbarth, Tim Güneysu, Christof Paar...