Sciweavers

5843 search results - page 1028 / 1169
» Software Security in Practice
Sort
View
ISEUD
2009
Springer
15 years 11 months ago
End-User Development of Enterprise Widgets
Companies are operating in a dynamic environment, resulting in a continuous need of adapting used information systems to changing business processes and associated information need...
Michael Spahn, Volker Wulf
SIGIR
2009
ACM
15 years 11 months ago
On rank correlation and the distance between rankings
Rank correlation statistics are useful for determining whether a there is a correspondence between two measurements, particularly when the measures themselves are of less interest...
Ben Carterette
VRST
2009
ACM
15 years 11 months ago
Wearable imaging system for capturing omnidirectional movies from a first-person perspective
We propose a novel wearable imaging system that can capture omnidirectional movies from the viewpoint of the camera wearer. The imaging system solves the problems of resolution un...
Kazuaki Kondo, Yasuhiro Mukaigawa, Yasushi Yagi
HICSS
2008
IEEE
172views Biometrics» more  HICSS 2008»
15 years 11 months ago
Semantic Web Services Monitoring: An OWL-S Based Approach
In this paper we describe mechanisms for execution monitoring of semantic web services, based on OWL-S. The use of semantic descriptions and ontologies is a valuable extension to ...
Roman Vaculín, Katia P. Sycara
ICDIM
2008
IEEE
15 years 11 months ago
A framework for RESTful object exchange through schematized XML (unRESTricted)
Client-server architectures with clients on divergent platforms are in need of services that serve a high level of interoperability and a loose binding. It should be prevented tha...
Barbara Van De Keer, Dieter Van Rijsselbergen, Eri...
« Prev « First page 1028 / 1169 Last » Next »