Sciweavers

1498 search results - page 284 / 300
» Creating Links into the Future
Sort
View
SACMAT
2003
ACM
14 years 1 months ago
Role mining - revealing business roles for security administration using data mining technology
In this paper we describe the work devising a new technique for role-finding to implement Role-Based Security Administration. Our results stem from industrial projects, where larg...
Martin Kuhlmann, Dalia Shohat, Gerhard Schimpf
JCDL
2010
ACM
188views Education» more  JCDL 2010»
14 years 1 months ago
Exposing the hidden web for chemical digital libraries
In recent years, the vast amount of digitally available content has lead to the creation of many topic-centered digital libraries. Also in the domain of chemistry more and more di...
Sascha Tönnies, Benjamin Köhncke, Oliver...
ICARCV
2002
IEEE
149views Robotics» more  ICARCV 2002»
14 years 1 months ago
A fast method to simulate virtual deformable objects with force feedback
In this paper, we propose solutions to real time simulation and interaction of deformable objects in virtual reality. Firstly, we present LEM - Long Element Method, a method creat...
Kenneth Sundaraj, César Mendoza, Christian ...
DESRIST
2009
Springer
118views Education» more  DESRIST 2009»
14 years 1 months ago
Building theory in the sciences of the artificial
This essay extends Simon’s arguments in the Sciences of the Artificial to a critical examination of how theorizing in Information Technology disciplines should occur. The essay ...
Shirley Gregor
OHS
2001
Springer
14 years 1 months ago
Revisiting and Versioning in Virtual Special Reports
Adaptation/personalization is one of the main issues for web applications and require large repositories. Creating adaptive web applications from these repositories requires to hav...
Sébastien Iksal, Serge Garlatti