Sciweavers

329 search results - page 58 / 66
» A Policy Based Role Object Model
Sort
View
CHI
1997
ACM
14 years 22 days ago
A Computer Participant in Musical Improvisation
the changing roles of participants in a musical improvisation and synchronously generate appropriate contributions of its own. Musical improvisation is a collaborative activity ana...
William F. Walker
CORR
2010
Springer
90views Education» more  CORR 2010»
13 years 7 months ago
Perfect Omniscience, Perfect Secrecy and Steiner Tree Packing
— We consider perfect secret key generation for a “pairwise independent network” model in which every pair of terminals share a random binary string, with the strings shared ...
Sirin Nitinawarat, Prakash Narayan
HICSS
2003
IEEE
124views Biometrics» more  HICSS 2003»
14 years 1 months ago
A Framework for Strategic Balancing of Knowledge Management Initiatives
Enterprises need to understand the impact of different types of knowledge management (KM) approaches on business strategy, and how they interact with other types of initiatives to...
Jan Aidemark, Håkan Sterner
COSIT
2005
Springer
125views GIS» more  COSIT 2005»
14 years 2 months ago
Landmark Extraction: A Web Mining Approach
Landmarks play crucial roles in human geographic knowledge. There has been much work focusing on the extraction of landmarks from geographic information systems (GIS) or 3D city mo...
Taro Tezuka, Katsumi Tanaka
SP
1998
IEEE
173views Security Privacy» more  SP 1998»
14 years 24 days ago
An Automated Approach for Identifying Potential Vulnerabilities in Software
This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Anup K. Ghosh, Tom O'Connor, Gary McGraw