Sciweavers

366 search results - page 42 / 74
» Access Policy Design Supported by FCA Methods
Sort
View
EUROPAR
2004
Springer
14 years 2 months ago
Databases, Workflows and the Grid in a Service Oriented Environment
As the Grid moves towards adopting a service-oriented architecture built on Web services, coupling between processes will rely on secure, reliable, and transacted messages and be s...
Zhuoan Jiao, Jasmin L. Wason, Wenbin Song, Fenglia...
BMCBI
2006
151views more  BMCBI 2006»
13 years 8 months ago
Machine learning and word sense disambiguation in the biomedical domain: design and evaluation issues
Background: Word sense disambiguation (WSD) is critical in the biomedical domain for improving the precision of natural language processing (NLP), text mining, and information ret...
Hua Xu, Marianthi Markatou, Rositsa Dimova, Hongfa...
EDBTW
2010
Springer
14 years 3 months ago
Toward a software development methodology for anonymity applications
There are some software applications especially in privacy protection domain which they need anonymity support. Therefore lots of methods and protocols have been presented so far ...
Marzieh Ispareh, Behrouz Tork Ladani, Shirin Shari...
CSCW
2011
ACM
13 years 3 months ago
Research team integration: what it is and why it matters
Science policy across the world emphasizes the desirability of research teams that can integrate diverse perspectives and expertise into new knowledge, methods, and products. Howe...
Aruna D. Balakrishnan, Sara B. Kiesler, Jonathon N...
INTERACT
2003
13 years 10 months ago
How Do People Get Back to Information on the Web? How Can They Do It Better?
: In one study, people are observed to keep web information for later use through many different methods including the use of Bookmarks (or Favorites), self-addressed email, hand-w...
William P. Jones, Harry Bruce, Susan T. Dumais