Sciweavers

2334 search results - page 243 / 467
» How are Real Grids Used
Sort
View
SOFTVIS
2003
ACM
15 years 10 months ago
Visualizing Software for Telecommunication Services
An active research area in telecommunications concerns how to specify and control the addition of new services, such as call waiting or instant messaging, into existing software. ...
Emden R. Gansner, John M. Mocenigo, Stephen C. Nor...
SPW
2000
Springer
15 years 8 months ago
Users and Trust in Cyberspace
The underlying belief and knowledge models assumed by various kinds of authentication protocols have been studied for well over 10 years now. On the other hand, the related questio...
Pekka Nikander, Kristiina Karvonen
KER
2008
103views more  KER 2008»
15 years 4 months ago
A context-sensitive framework for lexical ontologies
Human categorization is neither a binary nor a context-free process. Rather, the criteria that govern the use and recognition of certain concepts may be satisfied to different deg...
Tony Veale, Yanfen Hao
238
Voted
ECOOP
2009
Springer
16 years 5 months ago
Practical API Protocol Checking with Access Permissions
Reusable APIs often dene usage protocols. We previously developed a sound modular type system that checks compliance with typestate-based protocols while aording a great deal of al...
Kevin Bierhoff, Nels E. Beckman, Jonathan Aldrich
KDD
2005
ACM
109views Data Mining» more  KDD 2005»
16 years 5 months ago
Overcoming Incomplete User Models in Recommendation Systems Via an Ontology
Abstract. To make accurate recommendations, recommendation systems currently require more data about a customer than is usually available. We conjecture that the weaknesses are due...
Vincent Schickel-Zuber, Boi Faltings