Sciweavers

1418 search results - page 166 / 284
» How to Explain Mistakes
Sort
View
COMPUTER
2004
120views more  COMPUTER 2004»
13 years 10 months ago
Computer Security in the Real World
After thirty years of work on computer security, why are almost all the systems in service today extremely vulnerable to attack? The main reason is that security is expensive to s...
Butler W. Lampson
IPM
2000
108views more  IPM 2000»
13 years 10 months ago
A system for supporting cross-lingual information retrieval
In this paper, we present the system MULINEX, a fully implemented system which supports cross-lingual search of the WWW. Users can formulate, expand and disambiguate queries, filt...
Joanne Capstick, Abdel Kader Diagne, Gregor Erbach...
ENTCS
2002
78views more  ENTCS 2002»
13 years 10 months ago
Separating concerns in a high-level component-based context
Building on the work of architectural description languages and aspect-oriented programming, we try to improve current visual component composition environments. In our , we intro...
Wim Vanderperren, Bart Wydaeghe
COMPUTER
1999
108views more  COMPUTER 1999»
13 years 9 months ago
Distance Visualization: Data Exploration on the Grid
Scientific visualization has emerged as an important tool for extracting meaning from the large volumes of data produced by scientific instruments and simulations. Increasingly, t...
Ian T. Foster, Joseph A. Insley, Gregor von Laszew...
TSE
1998
77views more  TSE 1998»
13 years 9 months ago
Use Case Maps as Architectural Entities for Complex Systems
ABSTRACT. This paper presents a novel, scenario-based notation called Use Case Maps (UCMs) for describing, in a high-level way, how the organizational structure of a complex system...
Raymond J. A. Buhr