Sciweavers

1444 search results - page 69 / 289
» The end of users
Sort
View
HICSS
2003
IEEE
108views Biometrics» more  HICSS 2003»
15 years 3 months ago
Application Generator: A Framework and Methodology for IS Construction
Application generators have been championed because they can be used to shorten a system’s development cycle and therefore lower its development costs. Application generators ar...
Jen-Her Wu, Tse-Chih Hsia, I-Chia Chang, Sun-Jen T...
CIKM
2010
Springer
14 years 8 months ago
FacetCube: a framework of incorporating prior knowledge into non-negative tensor factorization
Non-negative tensor factorization (NTF) is a relatively new technique that has been successfully used to extract significant characteristics from polyadic data, such as data in s...
Yun Chi, Shenghuo Zhu
ASWEC
2005
IEEE
15 years 3 months ago
Deriving Systems Level Security Properties of Component Based Composite Systems
This paper proposes an approach of defining systemslevel security properties of component-based composite systems. It argues that the security properties of a composite system ca...
Khaled M. Khan, Jun Han
VL
2002
IEEE
129views Visual Languages» more  VL 2002»
15 years 2 months ago
A Data Mapping Specification Environment Using a Concrete Business Form-Based Metaphor
Many systems require data transformation – the conversion of complex data from one format to another. Most current approaches require programming, scripting bstract visual speci...
Yongqiang Li, John C. Grundy, Robert Amor, John G....
CCGRID
2004
IEEE
15 years 1 months ago
A hardware-secured credential repository for Grid PKIs
Public Key Infrastructures suffer from usability and security problems associated with the request for and secure management of end user credentials. Online credential repositorie...
Markus Lorch, Jim Basney, Dennis G. Kafura