Sciweavers

178 search results - page 14 / 36
» Dependability Arguments with Trusted Bases
Sort
View
CSMR
1998
IEEE
13 years 11 months ago
A Metrics Suite for Concurrent Logic Programs
AbstractA large body of research in the measurement of software complexity has been focused on imperative programs, but little eort has been made for logic programs. In this paper,...
Jianjun Zhao, Jingde Cheng, Kazuo Ushijima
ECIS
2000
13 years 8 months ago
Digital Material in a Political Work Context - The Case of Cuparla
Abstract - Understanding the appropriation of CSCW-Tools is key to their successful implementation. This paper explores the social and organizational appropriation of the Cuparla C...
Gerhard Schwabe, Helmut Krcmar
NDSS
2006
IEEE
14 years 1 months ago
Trust Negotiation with Hidden Credentials, Hidden Policies, and Policy Cycles
In an open environment such as the Internet, the decision to collaborate with a stranger (e.g., by granting access to a resource) is often based on the characteristics (rather tha...
Keith B. Frikken, Jiangtao Li, Mikhail J. Atallah
NAACL
2010
13 years 5 months ago
Joint Inference for Knowledge Extraction from Biomedical Literature
Knowledge extraction from online repositories such as PubMed holds the promise of dramatically speeding up biomedical research and drug design. After initially focusing on recogni...
Hoifung Poon, Lucy Vanderwende
RSCTC
1993
Springer
96views Fuzzy Logic» more  RSCTC 1993»
13 years 11 months ago
Trusting an Information Agent
: While the common kinds of uncertainties in databases (e.g., null values, disjunction, corrupt/missing data, domain mismatch, etc.) have been extensively studied, a relatively une...
Hasan M. Jamil, Fereidoon Sadri