Sciweavers

897 search results - page 49 / 180
» Identity: How to name it, How to find it
Sort
View
ICCHP
2010
Springer
13 years 7 months ago
Synote: Accessible and Assistive Technology Enhancing Learning for All Students
Abstract. Although manual transcription and captioning can increase the accessibility of multimedia for deaf students it is rarely provided in educational contexts in the UK due to...
Mike Wald
ESEM
2009
ACM
14 years 3 months ago
Using security metrics coupled with predictive modeling and simulation to assess security processes
: © Using Security Metrics Coupled with Predictive Modeling and Simulation to Assess Security Processes Yolanta Beres, Marco Casassa Mont, Jonathan Griffin, Simon Shiu HP Laborato...
Yolanta Beres, Marco Casassa Mont, Jonathan Griffi...
GI
2003
Springer
14 years 1 months ago
Active Data Protection with Data Journals
: A major privacy problem on the internet is the unrestricted sharing of user data between services and other parties. The EU privacy legislation grants the user the rights to rest...
Lars Brückner, Jan Steffan, Wesley Terpstra, ...
ISSA
2004
13 years 10 months ago
A Logic-Based Access Control Approach For Web Services
Web Services technology enables organisations to exploit software as a service. Services are accessed by method invocations. Method interfaces are described and published, and may...
Marijke Coetzee
AO
2007
114views more  AO 2007»
13 years 8 months ago
Roles, players and adaptable organizations
Role is a commonly used concept in software development, but a concept with divergent definitions. This paper discusses the characteristics of roles in software organizations, and...
Alan W. Colman, Jun Han