Sciweavers

8623 search results - page 1520 / 1725
» Software engineering for secure systems
Sort
View
127
Voted
CLEIEJ
2010
15 years 2 months ago
Professional Training Program Management through Holonic Networks
Holonic networks constitute a type of organizational structures widely used at manufacturing enterprises. In an educational context, however, this type of structures remains practi...
Jonas Montilva C., Milagro Rivero, Judith Barrios ...
DKE
2011
230views Education» more  DKE 2011»
14 years 12 months ago
Supporting concurrent ontology development: Framework, algorithms and tool
We propose a novel approach to facilitate the concurrent development of ontologies by different groups of experts. Our approach adapts Concurrent Versioning, a successful paradigm...
Ernesto Jiménez-Ruiz, Bernardo Cuenca Grau,...
132
Voted
COGSR
2010
149views more  COGSR 2010»
14 years 12 months ago
Cognitive concepts in autonomous soccer playing robots
Computational concepts of cognition, their implementation in complex autonomous systems, and their empirical evaluation are key techniques to understand and validate concepts of c...
Martin Lauer, Roland Hafner, Sascha Lange, Martin ...
TASLP
2010
97views more  TASLP 2010»
14 years 11 months ago
Hierarchical Bayesian Language Models for Conversational Speech Recognition
Traditional n-gram language models are widely used in state-of-the-art large vocabulary speech recognition systems. This simple model suffers from some limitations, such as overfi...
Songfang Huang, Steve Renals
145
Voted
MMMACNS
2005
Springer
15 years 10 months ago
A Modal Logic for Role-Based Access Control
Making correct access-control decisions is central to security, which in turn requires accounting correctly for the identity, credentials, roles, authority, and privileges of users...
Thumrongsak Kosiyatrakul, Susan Older, Shiu-Kai Ch...
« Prev « First page 1520 / 1725 Last » Next »