Sciweavers

1005 search results - page 136 / 201
» Information systems security engineering: a critical compone...
Sort
View
SIGSOFT
2008
ACM
14 years 9 months ago
Effective blame for information-flow violations
Programs trusted with secure information should not release that information in ways contrary to system policy. However, when a program contains an illegal flow of information, cu...
Dave King 0002, Trent Jaeger, Somesh Jha, Sanjit A...
WEBI
2009
Springer
14 years 3 months ago
Towards Bridging the Web and the Semantic Web
The World Wide Web (WWW) has provided us with a plethora of information. However, given its unstructured format, this information is useful mainly to humans and cannot be effectiv...
Swarnim Kulkarni, Doina Caragea
AGENTS
2001
Springer
14 years 1 months ago
Matchmaking for autonomous agents in electronic marketplaces
Matchmaking is the process of mediating demand and supply based on profile information. Matchmaking plays a crucial role in agent-based electronic marketplaces: the problem to be ...
Daniel Veit, Jörg P. Müller, Martin Schn...
ASWEC
2006
IEEE
14 years 3 months ago
An agent-oriented approach to change propagation in software evolution
Software maintenance and evolution are inevitable activities since almost all software that is useful and successful stimulates user-generated requests for change and improvements...
Khanh Hoa Dam, Michael Winikoff, Lin Padgham
TREC
2007
13 years 10 months ago
Question Answering with LCC's CHAUCER-2 at TREC 2007
In TREC 2007, Language Computer Corporation explored how a new, semantically-rich framework for information retrieval could be used to boost the overall performance of the answer ...
Andrew Hickl, Kirk Roberts, Bryan Rink, Jeremy Ben...