Sciweavers

9888 search results - page 1892 / 1978
» Active Algorithm Selection
Sort
View
SACMAT
2011
ACM
13 years 27 days ago
An integrated approach for identity and access management in a SOA context
In this paper, we present an approach for identity and access management (IAM) in the context of (cross-organizational) serviceoriented architectures (SOA). In particular, we deļ¬...
Waldemar Hummer, Patrick Gaubatz, Mark Strembeck, ...
SIGMOD
2011
ACM
282views Database» more  SIGMOD 2011»
13 years 27 days ago
SkylineSearch: semantic ranking and result visualization for pubmed
Life sciences researchers perform scientiļ¬c literature search as part of their daily activities. Many such searches are executed against PubMed, a central repository of life sci...
Julia Stoyanovich, Mayur Lodha, William Mee, Kenne...
CBSE
2011
Springer
12 years 10 months ago
Towards incremental component compatibility testing
Software components are increasingly assembled from other components. Each component may further depend on others, and each may have multiple active versions. The total number of ...
Il-Chul Yoon, Alan Sussman, Atif M. Memon, Adam A....
CRYPTO
2011
Springer
222views Cryptology» more  CRYPTO 2011»
12 years 10 months ago
The PHOTON Family of Lightweight Hash Functions
RFID security is currently one of the major challenges cryptography has to face, often solved by protocols assuming that an on-tag hash function is available. In this article we pr...
Jian Guo 0001, Thomas Peyrin, Axel Poschmann
DGO
2011
285views Education» more  DGO 2011»
12 years 10 months ago
Social media use by government: from the routine to the critical
Social media (i.e., Twitter, Facebook, Flickr, YouTube) and other services with user-generated content have made a staggering amount of information (and misinformation) available....
Andrea L. Kavanaugh, Edward A. Fox, Steven D. Shee...
« Prev « First page 1892 / 1978 Last » Next »