Sciweavers

5082 search results - page 170 / 1017
» Actionable Information in Vision
Sort
View
CSFW
1996
IEEE
15 years 8 months ago
Comparing Two Information Flow Security Properties
In this paper we compare two information flow security properties: the lazy security (L-Sec) [11] and the Bisimulation Non-deducibility on Compositions (BNDC) [4]. To make this we...
Riccardo Focardi
DGO
2003
97views Education» more  DGO 2003»
15 years 6 months ago
Designing a Metadata -Driven Visual Information Browser for Federal Statistics
When looking for federal statistics, finding the right table, chart or report can be a daunting task for anyone not thoroughly familiar with the federal statistical system. Search...
Bill Kules, Ben Shneiderman
ECIS
2000
15 years 6 months ago
Authentic Intervention in Information Systems Practice
In this paper the philosophical concept of authenticity is used as a framing device for providing an interpretation of aspects of both ethical and practical action on the part of i...
Robert A. Stephens, Stephen K. Probert
MIDDLEWARE
2005
Springer
15 years 10 months ago
Improving flexibility on host discovery for pervasive computing middlewares
The vision of pervasive or ubiquitous computing, conceived by Mark Weiser, foresees a world where computing is embedded in every day objects. Such objects interact with each other...
Emerson Loureiro, Loreno Oliveira, Hyggo Oliveira ...
VTC
2007
IEEE
104views Communications» more  VTC 2007»
15 years 11 months ago
Soft Information Aided ML Joint Frame Synchronization and Channel Estimation for Downlink MC-CDMA in the Presence of Narrowband
Abstract— Spectrum-overlay scenarios for wideband multicarrier (MC) systems bring new technical challenges that must be considered during the system design. In such a scenario, t...
Mohamed Marey, Mamoun Guenach, Frederik Simoens, H...