Sciweavers

96 search results - page 4 / 20
» Bibliography references validation using emergent architectu...
Sort
View
FSTTCS
2000
Springer
13 years 11 months ago
Data Provenance: Some Basic Issues
The ease with which one can copy and transform data on the Web, has made it increasingly di cult to determine the origins of a piece of data. We use the term data provenance to ref...
Peter Buneman, Sanjeev Khanna, Wang Chiew Tan
HICSS
2002
IEEE
120views Biometrics» more  HICSS 2002»
14 years 10 days ago
Para-social Presence: A Re-conceptualization of 'Social Presence' to Capture the Relationship between a Web Site and Her Visitor
The primary purpose of this paper is to describe the theoretical underpinnings of the construct Para-social Presence (PSP). Para-social presence refers to the extent to which a me...
Nanda Kumar, Izak Benbasat
QOSA
2007
Springer
14 years 1 months ago
Architectural Knowledge: Getting to the Core
Different organizations or organizational units are likely to store and maintain different types of information about their software architectures. This inhibits effective manageme...
Remco C. de Boer, Rik Farenhorst, Patricia Lago, H...
E4MAS
2006
Springer
13 years 11 months ago
Cognitive Stigmergy: Towards a Framework Based on Agents and Artifacts
Stigmergy has been adopted in MAS (multi-agent systems) and in other fields as a technique for realising forms of emergent coordination in societies composed by a large amount of a...
Alessandro Ricci, Andrea Omicini, Mirko Viroli, Lu...
JHSN
2006
267views more  JHSN 2006»
13 years 7 months ago
Client-side access control enforcement using trusted computing and PEI models
It has been recognized for some time that software alone does not provide an adequate foundation for building a high-assurance trusted platform. The emergence of industry-standard ...
Ravi S. Sandhu, Xinwen Zhang, Kumar Ranganathan, M...