Sciweavers

422 search results - page 64 / 85
» Risk management for distributed authorization
Sort
View
ATAL
2007
Springer
15 years 4 months ago
Towards valuation-aware agent-based traffic control
Traffic authorities work hard to improve resource utilization in traffic. But these efforts do not consider that the valuations of waiting time can be different for each driver, e...
Heiko Schepperle, Klemens Böhm, Simone Forste...
105
Voted
CSCW
2008
ACM
15 years 2 months ago
Mopping up: modeling wikipedia promotion decisions
This paper presents a model of the behavior of candidates for promotion to administrator status in Wikipedia. It uses a policy capture framework to highlight similarities and diff...
Moira Burke, Robert Kraut
95
Voted
LREC
2008
114views Education» more  LREC 2008»
15 years 2 months ago
UFRA: a UIMA-based Approach to Federated Language Resource Architecture
In this paper we address the issue of developing an interoperable infrastructure for language resources and technologies. In our approach, called UFRA, we extend the Federate Data...
Riccardo Del Gratta, Roberto Bartolini, Tommaso Ca...
178
Voted
CSCW
2011
ACM
14 years 7 months ago
Empirical software engineering at Microsoft Research
We describe the activities of the Empirical Software Engineering (ESE) group at Microsoft Research. We highlight our research themes and activities using examples from our researc...
Christian Bird, Brendan Murphy, Nachiappan Nagappa...
101
Voted
PERCOM
2006
ACM
16 years 8 days ago
Composition Trust Bindings in Pervasive Computing Service Composition
In pervasive computing, devices or peers may implement or compose services using services from other devices or peers, and may use components from various sources. A composition t...
John Buford, Rakesh Kumar, Greg Perkins