Sciweavers

674 search results - page 114 / 135
» Potential for personalization
Sort
View
SIGADA
2004
Springer
15 years 5 months ago
Enforcing security and safety models with an information flow analysis tool
Existing security models require that information of a given security level be prevented from “leaking” into lower-security information. High-security applications must be dem...
Roderick Chapman, Adrian Hilton
HICSS
2003
IEEE
144views Biometrics» more  HICSS 2003»
15 years 5 months ago
Democracy Functions of Information Technology
Information Technology, IT, may play an important part in any community as a supporting tool in the democratic process. The conditions for that to happen are primarily a genuine w...
Gunnar Lidén, Anders Avdic
ERLANG
2003
ACM
15 years 5 months ago
Evaluating distributed functional languages for telecommunications software
The distributed telecommunications sector not only requires minimal time to market, but also software that is reliable, available, maintainable and scalable. High level programmin...
Jan Henry Nyström, Philip W. Trinder, David J...
KCAP
2003
ACM
15 years 5 months ago
Building large knowledge bases by mass collaboration
Acquiring knowledge has long been the major bottleneck preventing the rapid spread of AI systems. Manual approaches are slow and costly. Machine-learning approaches have limitatio...
Matthew Richardson, Pedro Domingos
SIGSOFT
2003
ACM
15 years 5 months ago
Modeling and validation of service-oriented architectures: application vs. style
Most applications developed today rely on a given middleware platform which governs the interaction between components, the access to resources, etc. To decide, which platform is ...
Luciano Baresi, Reiko Heckel, Sebastian Thöne...