Sciweavers

26354 search results - page 135 / 5271
» How we refactor, and how we know it
Sort
View
EENERGY
2010
14 years 2 months ago
ICT for green: how computers can help us to conserve energy
Information and communication technology (ICT) consumes energy, but is also an important means of conserving energy. Conventionally, it has done so by optimizing the performance o...
Friedemann Mattern, Thorsten Staake, Markus Weiss
GROUP
2007
ACM
14 years 2 months ago
Community, consensus, coercion, control: cs*w or how policy mediates mass participation
When large groups cooperate, issues of conflict and control surface because of differences in perspective. Managing such diverse views is a persistent problem in cooperative group...
Travis Kriplean, Ivan Beschastnikh, David W. McDon...
ICAIL
2007
ACM
14 years 2 months ago
How to capture, model, and verify the knowledge of legal, security, and privacy experts: a pattern-based approach
Laws set requirements that force organizations to assess the security and privacy of their IT systems and impose the adoption of the implementation of minimal precautionary securi...
Luca Compagna, Paul El Khoury, Fabio Massacci, Res...
ESWS
2004
Springer
14 years 2 months ago
No Registration Needed: How to Use Declarative Policies and Negotiation to Access Sensitive Resources on the Semantic Web
Gaining access to sensitive resources on the Web usually involves an explicit registration step, where the client has to provide a predetermined set of information to the server. T...
Rita Gavriloaie, Wolfgang Nejdl, Daniel Olmedilla,...
AISC
2010
Springer
14 years 1 months ago
How to Correctly Prune Tropical Trees
We present tropical games, a generalization of combinatorial min-max games based on tropical algebras. Our model breaks the traditional symmetry of rational zero-sum games where pl...
Jean-Vincent Loddo, Luca Saiu