Sciweavers

621 search results - page 79 / 125
» Dialogue Management in an Automatic Meteorological Informati...
Sort
View
CHI
2008
ACM
14 years 9 months ago
Talc: using desktop graffiti to fight software vulnerability
With the proliferation of computer security threats on the Internet, especially threats such as worms that automatically exploit software flaws, it is becoming more and more impor...
Kandha Sankarpandian, Travis Little, W. Keith Edwa...
IDEAS
2000
IEEE
98views Database» more  IDEAS 2000»
14 years 1 months ago
Keeping Web Pages Up-to-Date with SQL: 1999
From the beginnings of the World Wide Web (WWW or Web) and the definition of the Common Gateway Interface (CGI), Web site administrators have used dynamically generated HTML page...
Henrik Loeser
DIM
2008
ACM
13 years 10 months ago
Proposal of privacy policy matching engine
We propose a system called "Privacy Policy Matching Engine", which enables a matching of a user's intention to provide his/her identity-related data and enterprises...
Takao Kojima, Yukio Itakura
CAISE
1999
Springer
14 years 1 months ago
A Uniform Approach to Inter-model Transformations
Whilst it is a common task in systems integration to have to transform between di erent semantic data models, such inter-model transformations are often speci ed in an ad hoc manne...
Peter McBrien, Alexandra Poulovassilis
IEEECIT
2010
IEEE
13 years 7 months ago
A Self-Adaptable Approach for Easing the Development of Grid-Oriented Services
—The Service-Oriented Architecture (SOA) leverages ice abstraction to enable the development of modular, loose-coupled and distributed applications. In order to use such an archi...
Andre Lage Freitas, Jean-Louis Pazat