Sciweavers

739 search results - page 106 / 148
» Information Flow in Credential Systems
Sort
View
ICETE
2004
253views Business» more  ICETE 2004»
13 years 9 months ago
BLAZE: A Mobile Agent Paradigm for VoIP Intrusion Detection Systems
ser provides abstraction for supporting flexible security policies that can be developed using the low-level primitives of the browser. We believe our browser architecture will be ...
Kapil Singh, Son T. Vuong
CHI
2007
ACM
14 years 8 months ago
A study of out-of-turn interaction in menu-based, IVR, voicemail systems
We present the first user study of out-of-turn interaction in menu-based, interactive voice-response systems. Out-ofturn interaction is a technique which empowers the user (unable...
Saverio Perugini, Taylor J. Anderson, William F. M...
BMCBI
2008
125views more  BMCBI 2008»
13 years 7 months ago
SNPLims: a data management system for genome wide association studies
Background: Recent progresses in genotyping technologies allow the generation high-density genetic maps using hundreds of thousands of genetic markers for each DNA sample. The ava...
Alessandro Orro, Guia Guffanti, Erika Salvi, Fabio...
ECIS
2000
13 years 9 months ago
Yarra Valley Water: A Successful Change Programme for a Corporatised Water Utility
Yarra Valley Water, a corporatised water utility achieved the significant efficiencies that are promised from the move towards privatisation. At the same time it substantially imp...
J. Brudenell, Geoff A. Sandy
LCPC
2000
Springer
13 years 11 months ago
SmartApps: An Application Centric Approach to High Performance Computing
State-of-the-art run-time systems are a poor match to diverse, dynamic distributed applications because they are designed to provide support to a wide variety of applications, with...
Lawrence Rauchwerger, Nancy M. Amato, Josep Torrel...