Sciweavers

762 search results - page 105 / 153
» Using Web Data Provenance for Quality Assessment
Sort
View
ZUM
2005
Springer
136views Formal Methods» more  ZUM 2005»
15 years 4 months ago
Some Guidelines for Formal Development of Web-Based Applications in B-Method
Abstract. Web-based applications are the most common form of distributed systems that have gained a lot of attention in the past ten years. Today many of us are relying on scores o...
Abdolbaghi Rezazadeh, Michael J. Butler
USS
2010
14 years 9 months ago
Adapting Software Fault Isolation to Contemporary CPU Architectures
Software Fault Isolation (SFI) is an effective approach to sandboxing binary code of questionable provenance, an interesting use case for native plugins in a Web browser. We prese...
David Sehr, Robert Muth, Cliff Biffle, Victor Khim...
CIVR
2004
Springer
122views Image Analysis» more  CIVR 2004»
15 years 4 months ago
User Strategies in Video Retrieval: A Case Study
In this paper we present the results of a user study that was conducted in combination with a submission to TRECVID 2003. Search behavior of students querying an interactive video-...
Laura Hollink, Giang P. Nguyen, Dennis Koelma, A. ...
BMCBI
2004
174views more  BMCBI 2004»
14 years 11 months ago
Implications for domain fusion protein-protein interactions based on structural information
Background: Several in silico methods exist that were developed to predict protein interactions from the copious amount of genomic and proteomic data. One of these methods is Doma...
Jer-Ming Chia, Prasanna R. Kolatkar
CSREASAM
2009
15 years 9 days ago
A Service Framework based on Grades of IdPs and SPs
In Web services, a framework for the separation of authentication (IdP) and services (SP) has been proposed and actually deployed. In this framework, quality of information provide...
Sato Hiroyuki