Sciweavers

1099 search results - page 182 / 220
» Evaluating Integration Architectures - A Scenario-Based Eval...
Sort
View
PERCOM
2005
ACM
14 years 8 months ago
Secure context-sensitive authorization
There is a recent trend toward rule-based authorization systems to achieve flexible security policies. Also, new sensing technologies in pervasive computing make it possible to de...
Kazuhiro Minami, David Kotz
GLVLSI
2009
IEEE
155views VLSI» more  GLVLSI 2009»
14 years 3 months ago
Buffer design and optimization for lut-based structured ASIC design styles
The interconnection delay of pre-fabricated design style dominates circuit delay due to the heavily downstream capacitance. Buffer insertion is a widely used technique to split o...
Po-Yang Hsu, Shu-Ting Lee, Fu-Wei Chen, Yi-Yu Liu
KI
2009
Springer
14 years 3 months ago
Robust Processing of Situated Spoken Dialogue
Spoken dialogue is notoriously hard to process with standard language processing technologies. Dialogue systems must indeed meet two major challenges. First, natural spoken dialogu...
Pierre Lison, Geert-Jan M. Kruijff
KCAP
2009
ACM
14 years 3 months ago
Formally measuring agreement and disagreement in ontologies
Ontologies are conceptual models of particular domains, and domains can be modeled differently, representing different opinions, beliefs or perspectives. In other terms, ontolog...
Mathieu d'Aquin
COLCOM
2007
IEEE
14 years 3 months ago
Modeling trust in collaborative information systems
—Collaborative systems available on the Web allow millions of users to share information through a growing collection of tools and platforms such as wikis, blogs and shared forum...
Sara Javanmardi, Cristina Videira Lopes