Sciweavers

4445 search results - page 97 / 889
» Reflective Authorization Systems
Sort
View
WORDS
2005
IEEE
15 years 9 months ago
Towards Self-Healing Systems via Dependable Architecture and
Self-healing systems focus on how to reducing the complexity and cost of the management of dependability policies and mechanisms without human intervention. This position paper pr...
Hong Mei, Gang Huang, Wei-Tek Tsai
131
Voted
AIED
2005
Springer
15 years 9 months ago
Educational Data Mining: a Case Study
In this paper, we show how using data mining algorithms can help discovering pedagogically relevant knowledge contained in databases obtained from Web-based educational systems. Th...
Agathe Merceron, Kalina Yacef
XMLSEC
2003
ACM
15 years 9 months ago
First experiences using XACML for access control in distributed systems
Authorization systems today are increasingly complex. They span domains of administration, rely on many different authentication sources, and manage permissions that can be as com...
Markus Lorch, Seth Proctor, Rebekah Lepro, Dennis ...
AIR
2005
102views more  AIR 2005»
15 years 4 months ago
A Case-Based Explanation System for Black-Box Systems
Most users of machine-learning products are reluctant to use the systems without any sense of the underlying logic that has led to the system's predictions. Unfortunately many...
Conor Nugent, Padraig Cunningham
TEI
2010
ACM
181views Hardware» more  TEI 2010»
15 years 11 months ago
Scanning FTIR: unobtrusive optoelectronic multi-touch sensing through waveguide transmissivity imaging
We describe a new method of multi-touch sensing which can be unobtrusively added to existing displays. By coupling individually controlled optoelectronics to the edge of a planar ...
Jon Moeller, Andruid Kerne