Sciweavers

3334 search results - page 567 / 667
» Using User Models in Music Information Retrieval Systems
Sort
View
143
Voted
SACMAT
2005
ACM
15 years 9 months ago
Peer-to-peer access control architecture using trusted computing technology
It has been recognized for some time that software alone does not provide an adequate foundation for building a high-assurance trusted platform. The emergence of industry-standard...
Ravi S. Sandhu, Xinwen Zhang
CHI
2006
ACM
16 years 4 months ago
The design of an interactive and dynamic representation of the firm
Interpretation and audit of financial information is a significant undertaking that must rest on a fuller understanding of the firm and its operations. A pictorial representation ...
Lin Zhao, Julia Grant, Fred L. Collopy
156
Voted
ICEIS
2008
IEEE
15 years 10 months ago
Tool Support for the Integration of Light-Weight Ontologies
In many areas of computer science ontologies become more and more important. The use of ontologies for domain modeling often brings up the issue of ontology integration. The task o...
Thomas Heer, Daniel Retkowitz, Bodo Kraft
157
Voted
CORR
2002
Springer
187views Education» more  CORR 2002»
15 years 3 months ago
Answer Sets for Consistent Query Answering in Inconsistent Databases
A relational database is inconsistent if it does not satisfy a given set of integrity constraints. Nevertheless, it is likely that most of the data in it is consistent with the co...
Marcelo Arenas, Leopoldo E. Bertossi, Jan Chomicki
119
Voted
IUI
2005
ACM
15 years 9 months ago
Adaptive teaching strategy for online learning
Finding the optimal teaching strategy for an individual student is difficult even for an experienced teacher. Identifying and incorporating multiple optimal teaching strategies fo...
Jungsoon P. Yoo, Cen Li, Chrisila C. Pettey