Sciweavers

4445 search results - page 126 / 889
» Reflective Authorization Systems
Sort
View
SACMAT
2009
ACM
15 years 11 months ago
xDomain: cross-border proofs of access
A number of research systems have demonstrated the benefits of accompanying each request with a machine-checkable proof that the request complies with access-control policy — a...
Lujo Bauer, Limin Jia, Michael K. Reiter, David Sw...
GIL
2007
15 years 5 months ago
Use of vegetation indices to detect plant diseases
: Today’s agriculture is not only confronted with the production of food and animal food, but also with aspects of environmental protection. In today’s crop production, there i...
Kerstin Gröll, Simone Graeff, Wilhelm Claupei...
DDEP
2000
Springer
15 years 8 months ago
A Link-Oriented Comparison of Hyperdocuments and Programs
There are parallels between the construction of programs and the construction of hypertexts, and in ar between the abstractions available to the application programmer and those a...
Heather Brown, Peter J. Brown, Les Carr, Wendy Hal...
FLAIRS
1998
15 years 5 months ago
Function Modeling for an Integrated Framework: A Progress Report
This paper discusses some preliminary results of the author's on-going research into the representation of product function information for integrated knowledge-based environ...
Filippo A. Salustri
CMMR
2009
Springer
187views Music» more  CMMR 2009»
15 years 8 months ago
Quantum Harmonic Oscillator Sonification
This work deals with the sonification of a quantum mechanical system and the processes that occur as a result of its quantum mechanical nature and interactions with other systems....
Anna Saranti, Gerhard Eckel, David Pirrò