Sciweavers

5255 search results - page 1018 / 1051
» Formal Methods for Privacy
Sort
View
IUI
2006
ACM
14 years 1 months ago
Interactive learning of structural shape descriptions from automatically generated near-miss examples
Sketch interfaces provide more natural interaction than the traditional mouse and palette tool, but can be time consuming to build if they have to be built anew for each new domai...
Tracy Hammond, Randall Davis
IUI
2006
ACM
14 years 1 months ago
A cognitively based approach to affect sensing from text
Studying the relationship between natural language and affective information as well as assessing the underpinned affective qualities of natural language are becoming crucial for ...
Shaikh Mostafa Al Masum, Helmut Prendinger, Mitsur...
NSPW
2006
ACM
14 years 1 months ago
E-Prime for security: a new security paradigm
This paper details a true and striking paradigm shift: the use of E-Prime for (at least) user-centered security, organizational/enterprise security policies and informal security ...
Steven J. Greenwald
ICCAD
2005
IEEE
132views Hardware» more  ICCAD 2005»
14 years 1 months ago
Battery optimization vs energy optimization: which to choose and when?
— Batteries are non-ideal energy sources – minimizing the energy consumption of a battery-powered system is not equivalent to maximizing its battery life. We propose an alterna...
Ravishankar Rao, Sarma B. K. Vrudhula
ICEIS
2005
IEEE
14 years 1 months ago
Conditions for Interoperability
Abstract: Interoperability for information systems remains a challenge both at the semantic and organisational levels. The original three-level architecture for local databases nee...
B. Nick Rossiter, Michael A. Heather
« Prev « First page 1018 / 1051 Last » Next »