Sciweavers

3712 search results - page 490 / 743
» Role-Based Access Control
Sort
View
ECIS
2000
15 years 6 months ago
Towards a Secure Web-Based Health Care Application
Even though security requirements in health care are traditionally high, most computerized health care applications lack sophisticated security measures or focus only on single sec...
Susanne Röhrig, Konstantin Knorr
WSC
2000
15 years 6 months ago
Simulation as educational support for production and logistics in industrial engineering
The proposed implementation is a monitor system able to train operators for on-line real time manufacturing control in order to analyze the performance of a production process. Th...
Agostino G. Bruzzone, Pietro Giribone, Roberto Rev...
ASSETS
2008
ACM
15 years 6 months ago
Analysis of speech properties of neurotypicals and individuals diagnosed with autism and down
Many individuals diagnosed with autism and Down syndrome have difficulties producing intelligible speech. Systematic analysis of their voice parameters could lead to better unders...
Mohammed E. Hoque
150
Voted
CNL
2009
15 years 6 months ago
Anaphora Resolution Involving Interactive Knowledge Acquisition
Abstract. Anaphora resolution in current computer-processable controlled natural languages relies mainly on syntactic information, accessibility constraints and the distance of the...
Rolf Schwitter
ERCIMDL
2010
Springer
151views Education» more  ERCIMDL 2010»
15 years 6 months ago
DiLiA - The Digital Library Assistant
In this paper we present the digital library assistant (DiLiA). The system aims at augmenting the search in digital libraries in several dimensions. In the project advanced informa...
Kathrin Eichler, Holmer Hemsen, Günter Neuman...