Sciweavers

9873 search results - page 145 / 1975
» Emergent Semantics Systems
Sort
View
IMCS
2007
78views more  IMCS 2007»
13 years 10 months ago
Usable set-up of runtime security policies
Setting up runtime security policies as required for firewalls or as envisioned by policy languages for the Semantic Web is a difficult task, especially for lay users who have l...
Almut Herzog, Nahid Shahmehri
JSS
2002
84views more  JSS 2002»
13 years 9 months ago
The impact of component architectures on interoperability
Component interoperability has become an important concern as companies migrate legacy systems, integrate COTS products, and assemble modules from disparate sources into a single ...
Leigh A. Davis, Rose F. Gamble, Jamie Payton
PUC
2007
113views more  PUC 2007»
13 years 9 months ago
Yesterday's tomorrows: notes on ubiquitous computing's dominant vision
Ubiquitous computing is unusual amongst technological research arenas. Most areas of computer science research, such as programming language implementation, distributed operating s...
Genevieve Bell, Paul Dourish
ICWSM
2009
13 years 7 months ago
A Categorical Model for Discovering Latent Structure in Social Annotations
The advent of social tagging systems has enabled a new community-based view of the Web in which objects like images, videos, and Web pages are annotated by thousands of users. Und...
Said Kashoob, James Caverlee, Ying Ding
ECEASST
2010
13 years 5 months ago
Security Evaluation and Hardening of Free and Open Source Software (FOSS)
Abstract: Recently, Free and Open Source Software (FOSS) has emerged as an alternative to Commercial-Off-The-Shelf (COTS) software. Now, FOSS is perceived as a viable long-term sol...
Robert Charpentier, Mourad Debbabi, Dima Alhadidi,...