Sciweavers

1278 search results - page 227 / 256
» Trust management for Web Services
Sort
View
ERCIMDL
2006
Springer
115views Education» more  ERCIMDL 2006»
15 years 3 months ago
Introducing Pergamos: A Fedora-Based DL System Utilizing Digital Object Prototypes
This demonstration provides a "hands on" experience to the "internals" of Pergamos, the University of Athens DL System. Pergamos provides uniform high level DL ...
George Pyrounakis, Kostas Saidis, Mara Nikolaidou,...
CSE
2009
IEEE
15 years 3 months ago
Self-Adaptation of Fault Tolerance Requirements Using Contracts
Fault tolerance is a constant concern in data centers where servers have to run with a minimal level of failures. Changes on the operating conditions or on server demands, and var...
André Luiz B. Rodrigues, Leila N. Bezerra, ...
EDM
2010
128views Data Mining» more  EDM 2010»
15 years 1 months ago
Using Educational Data Mining Methods to Study the Impact of Virtual Classroom in E-Learning
In the past few years, Iranian universities have embarked to use e-learning tools and technologies to extend and improve their educational services. After a few years of conducting...
Mohammad Hassan Falakmasir, Jafar Habibi
COMAD
2008
15 years 1 months ago
The Efficient Maintenance of Access Roles with Role Hiding
Role-based access control (RBAC) has attracted considerable research interest. However, the computational issues of RBAC models are yet to be thoroughly studied. In this paper, we...
Chaoyi Pang, Xiuzhen Zhang, Yanchun Zhang, Kotagir...
BIOINFORMATICS
2004
90views more  BIOINFORMATICS 2004»
14 years 11 months ago
GDPC: connecting researchers with multiple integrated data sources
Summary: The goal of this project is to simplify access to genomic diversity and phenotype data, thereby encouraging reuse of this data. The Genomic Diversity and Phenotype Connec...
Terry M. Casstevens, Edward S. Buckler