Sciweavers

1592 search results - page 129 / 319
» The state of the email address
Sort
View
121
Voted
CASSIS
2004
Springer
15 years 6 months ago
History-Based Access Control and Secure Information Flow
Abstract. This paper addresses the problem of static checking of programs to ensure that they satisfy confidentiality policies in the presence of dynamic access control in the for...
Anindya Banerjee, David A. Naumann
101
Voted
MATES
2004
Springer
15 years 6 months ago
C-IPS: Specifying Decision Interdependencies in Negotiations
Negotiation is an important mechanism of coordination in multiagent systems. Contrary to early conceptualizations of negotiating agents, we believe that decisions regarding the neg...
Kay Schröter, Diemo Urbig
98
Voted
VLDB
2004
ACM
111views Database» more  VLDB 2004»
15 years 6 months ago
Lifting the Burden of History from Adaptive Query Processing
Adaptive query processing schemes attempt to reoptimize query plans during the course of query execution. A variety of techniques for adaptive query processing have been proposed,...
Amol Deshpande, Joseph M. Hellerstein
90
Voted
ICAIL
2003
ACM
15 years 6 months ago
A Comparative Evaluation of Name-Matching Algorithms
Name matching—recognizing when two different strings are likely to denote the same entity—is an important task in many legal information systems, such as case-management syste...
Karl Branting
SIGUCCS
2003
ACM
15 years 6 months ago
The technology learning center (TLC): a comprehensive learning environment for students
As technology becomes more pervasive in our lives, and continues to change rapidly, it is essential for college students to have opportunities to improve their computer abilities ...
Sheree Kornkven