Sciweavers

503 search results - page 75 / 101
» Authenticity by tagging and typing
Sort
View
IJCAI
1997
13 years 9 months ago
Toward Structured Retrieval in Semi-structured Information Spaces
A semi-structured information space consists of multiple collections of textual documents containing fielded or tagged sections. The space can be highly heterogeneous, because eac...
Scott B. Huffman, Catherine Baudin
IJMMS
2008
90views more  IJMMS 2008»
13 years 7 months ago
Pair programming and the mysterious role of the navigator
Computer programming is generally understood to be highly challenging and since its inception a wide range of approaches, tools and methodologies have been developed to assist in ...
Sallyann Bryant, Pablo Romero, Benedict du Boulay
MODELLIERUNG
2008
13 years 9 months ago
Modelling Security Goals in Business Processes
: Various types of security goals, such as authentication or confidentiality, can be defined as policies for process-aware information systems, typically in a manual fashion. There...
Christian Wolter, Michael Menzel, Christoph Meinel
ESORICS
2009
Springer
14 years 8 months ago
Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing
Cloud Computing has been envisioned as the next-generation architecture of IT Enterprise. It moves the application software and databases to the centralized large data centers, whe...
Qian Wang, Cong Wang, Jin Li, Kui Ren, Wenjing Lou
HT
2011
ACM
12 years 11 months ago
Personalisation in the wild: providing personalisation across semantic, social and open-web resources
One of the key motivating factors for information providers to use personalisation is to maximise the benefit to the user in accessing their content. However, traditionally such s...
Ben Steichen, Alexander O'Connor, Vincent Wade