Sciweavers

7059 search results - page 1371 / 1412
» Bayesian network management
Sort
View
SOSP
2009
ACM
14 years 5 months ago
Improving application security with data flow assertions
RESIN is a new language runtime that helps prevent security vulnerabilities, by allowing programmers to specify application-level data flow assertions. RESIN provides policy obje...
Alexander Yip, Xi Wang, Nickolai Zeldovich, M. Fra...
WWW
2010
ACM
14 years 3 months ago
Atomate it! end-user context-sensitive automation using heterogeneous information sources on the web
The transition of personal information management (PIM) tools off the desktop to the Web presents an opportunity to augment these tools with capabilities provided by the wealth o...
Max Van Kleek, Brennan Moore, David R. Karger, Pau...
HICSS
2010
IEEE
225views Biometrics» more  HICSS 2010»
14 years 3 months ago
A Comparative Analysis of Professional Forums in the United States Army and Hybrid Communities of Practice in the Civilian Secto
Communities of practice (COPs) have been around since the founding of the first social networks many millennia ago. Organizations around the world over the last two decades have l...
Jon Brickey, Steven Walczak
DASFAA
2009
IEEE
195views Database» more  DASFAA 2009»
14 years 3 months ago
The XMLBench Project: Comparison of Fast, Multi-platform XML libraries
The XML technologies have brought a lot of new ideas and abilities in the field of information management systems. Nowadays, XML is used almost everywhere: from small configurati...
Suren Chilingaryan
OZCHI
2009
ACM
14 years 3 months ago
Towards an ethical interaction design: the issue of including stakeholders in law-enforcement software development
In the public sector (particularly in the UK in light of recent reforms i.e. the Local Government Act 2000, etc.) a greater degree of accountability and public involvement or inte...
Patrick G. Watson, Penny Duquenoy, Margaret Brenna...
« Prev « First page 1371 / 1412 Last » Next »