Sciweavers

1352 search results - page 109 / 271
» Designing Security Requirements Models Through Planning
Sort
View
CCS
2009
ACM
14 years 4 months ago
Physically restricted authentication with trusted hardware
Modern computer systems permit users to access protected information from remote locations. In certain secure environments, it would be desirable to restrict this access to a part...
Michael S. Kirkpatrick, Elisa Bertino
IEAAIE
2005
Springer
14 years 3 months ago
AI/NLP Technologies Applied to Spacecraft Mission Design
In this paper we propose the model of a prototypical NLP architecture of an information access system to support a team of experts in a scientific design task, in a shared and hete...
Maria Teresa Pazienza, Marco Pennacchiotti, Michel...
CHIMIT
2007
ACM
14 years 2 months ago
Managing technology use and learning in nonprofit community organizations: methodological challenges and opportunities
We are investigating how to empower nonprofit community organizations to develop the information technology management practices required to carry out their civic goals. We highli...
Cecelia Merkel, Umer Farooq, Lu Xiao, Craig H. Gan...
JNSM
2008
130views more  JNSM 2008»
13 years 10 months ago
Declarative Infrastructure Configuration Synthesis and Debugging
There is a large conceptual gap between end-to-end infrastructure requirements and detailed component configuration implementing those requirements. Today, this gap is manually br...
Sanjai Narain, Gary Levin, Sharad Malik, Vikram Ka...
ICRA
1995
IEEE
79views Robotics» more  ICRA 1995»
14 years 1 months ago
Learning to predict Resistive Forces During Robotic Excavation
— Few robot tasks require as forceful an interaction with the world as excavation. In order to effectively plan its actions, our robot excavator requires a method that allows it ...
Sanjiv Singh