Sciweavers

177 search results - page 33 / 36
» From Business Process Choreography to Authorization Policies
Sort
View
DSS
2007
226views more  DSS 2007»
13 years 8 months ago
Dare to share: Protecting sensitive knowledge with data sanitization
chool of Business Research – FY 2007 Research Abstracts Dare to Share: Protecting Sensitive Knowledge with Data Sanitization Data sanitization is a process that is used to promot...
Ali Amiri
IWAN
2000
Springer
14 years 3 days ago
A Flexible IP Active Networks Architecture
This paper presents the main concepts of the IST Project FAIN "Future Active IP Networks" [10], a three-year collaborative research project, whose main task is to develo...
Alex Galis, Bernhard Plattner, Jonathan M. Smith, ...
CHI
2007
ACM
14 years 9 months ago
Work-centered design: a case study of a mixed-initiative scheduler
We present the case study of a complex, mixed-initiative scheduling system to illustrate Work-Centered Design (WCD), a new approach for the design of information systems. WCD is b...
Keith A. Butler, Jiajie Zhang, Chris Esposito, Ali...
SIGIR
2006
ACM
14 years 2 months ago
Identifying comparative sentences in text documents
This paper studies the problem of identifying comparative sentences in text documents. The problem is related to but quite different from sentiment/opinion sentence identification...
Nitin Jindal, Bing Liu
DKE
2006
70views more  DKE 2006»
13 years 8 months ago
Merging news reports that describe events
Many kinds of news report provide information about events. For example, business news reports in the area of mergers and acquisitions, provide information about events such as &q...
Anthony Hunter, Rupert Summerton