Sciweavers

928 search results - page 122 / 186
» Safety management of complex technology
Sort
View
DIM
2005
ACM
14 years 12 months ago
Establishing and protecting digital identity in federation systems
We develop solutions for the security and privacy of user identity information in a federation. By federation we mean a group of organizations or service providers which have buil...
Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciari...
ERCIMDL
2006
Springer
174views Education» more  ERCIMDL 2006»
14 years 12 months ago
Using MILOS to Build a Multimedia Digital Library Application: The PhotoBook Experience
Abstract. The digital library field is recently broadening its scope of applicability and it is also continuously adapting to the frequent changes occurring in the internet society...
Giuseppe Amato, Paolo Bolettieri, Franca Debole, F...
ICDE
2008
IEEE
142views Database» more  ICDE 2008»
15 years 11 months ago
A Motion-Aware Approach to Continuous Retrieval of 3D Objects
Abstract-- With recent advances in mobile computing technologies, mobile devices can now render 3D objects realistically. Many users of these devices such as tourists, mixed-realit...
Mohammed Eunus Ali, Rui Zhang, Egemen Tanin, Lars ...
WWW
2004
ACM
15 years 10 months ago
Semantic web applications to e-science in silico experiments
This paper explains our research and implementations of manual, automatic and deep annotations of provenance logs for e-Science in silico experiments. Compared to annotating gener...
Jun Zhao, Carole A. Goble, Robert Stevens
86
Voted
SIGCSE
2009
ACM
144views Education» more  SIGCSE 2009»
15 years 10 months ago
A model academic ethics and integrity policy for computer science departments
For decades, US universities and colleges have had policies pertaining to the conduct of their students at the institutional level. These policies are referred to as Academic Inte...
Charles Riedesel, Eric D. Manley, Susan Poser, Jit...