Sciweavers

10210 search results - page 2011 / 2042
» Configuring Database Systems
Sort
View
CCS
2004
ACM
14 years 2 months ago
Privacy and security in library RFID: issues, practices, and architectures
We expose privacy issues related to Radio Frequency Identification (RFID) in libraries, describe current deployments, and suggest novel architectures for library RFID. Libraries ...
David Molnar, David Wagner
ER
2004
Springer
169views Database» more  ER 2004»
14 years 2 months ago
Intentional Modeling to Support Identity Management
Identity management has arisen as a major and urgent challenge for internet-based communications and information services. Internet services involve complex networks of relationshi...
Lin Liu, Eric S. K. Yu
GECCO
2004
Springer
14 years 2 months ago
Improving Generalisation Performance Through Multiobjective Parsimony Enforcement
This paper describes POPE-GP, a system that makes use of the NSGA-II multiobjective evolutionary algorithm as an alternative, parameter-free technique for eliminating program bloat...
Yaniv Bernstein, Xiaodong Li, Victor Ciesielski, A...
GI
2004
Springer
14 years 2 months ago
Quality Criteria for Competency Assignments: Examples from a Project Management Case Study
: We present several quality criteria for skills management initiatives based on the competence-performance approach [Kor97]. The criteria help to measure reliability and validity ...
Tobias Ley, Dietrich Albert
JIT
2004
Springer
204views Database» more  JIT 2004»
14 years 2 months ago
Ercatons: Thing-Oriented Programming
Thing-oriented programming (TP) is an emerging programming model which overcomes some of the limitations of current practice in software development in general and of object-orient...
Oliver Imbusch, Falk Langhammer, Guido von Walter
« Prev « First page 2011 / 2042 Last » Next »