Sciweavers

1554 search results - page 111 / 311
» An Overview of the Spring System
Sort
View

Lecture Notes
404views
15 years 7 months ago
Network Security
A comprehensive treatment of network security. Topics include remote access security, DMZ, firewalls, VPNs, PKI architecture, X.509 Public key infrastructure, web security, S-HTTP,...
Raj Jain
EUROMICRO
1999
IEEE
14 years 1 months ago
Processing Requirements by Software Configuration Management
Short development life cycles, the importance of timeto-market and fast changes in technology influence the requirements engineering process. Requirements are exposed to changes d...
Ivica Crnkovic, Peter J. Funk, Magnus Larsson
PRICAI
2004
Springer
14 years 3 months ago
K2: Animated Agents that Understand Speech Commands and Perform Actions
This paper presents a prototype dialogue system, K2, in which a user can instruct agents through speech input to manipulate various objects in a 3-D virtual world. The agents’ ac...
Takenobu Tokugana, Kotaro Funakoshi, Hozumi Tanaka
HICSS
2003
IEEE
102views Biometrics» more  HICSS 2003»
14 years 2 months ago
Trust in Electronic Environments
The objective of this paper is to provide a unified, theoretically grounded framework for trust in electronic environments. An overview of the research on trust is presented, exam...
Kari Chopra, William A. Wallace
SAC
1997
ACM
14 years 1 months ago
Query Planning in Infomaster
Infomaster is an information integration system. It provides integrated access to distributed, heterogeneous information sources, thus giving its users the illusion of a centraliz...
Oliver M. Duschka, Michael R. Genesereth