Sciweavers

1625 search results - page 210 / 325
» Intentionality
Sort
View
MSWIM
2004
ACM
14 years 4 months ago
Modeling wireless shadow networks
In case of natural disasters or intentional attacks, telecommunication networks often get heavily damaged and current resilience schemes have proven to be insufficient for rapid r...
Filip De Turck, Aurel A. Lazar
SAC
2004
ACM
14 years 4 months ago
Caching in Web memory hierarchies
Web cache replacement algorithms have received a lot of attention during the past years. Though none of the proposed algorithms deals efficiently with all the particularities of t...
Dimitrios Katsaros, Yannis Manolopoulos
SACMAT
2004
ACM
14 years 4 months ago
Using trust and risk in role-based access control policies
Emerging trust and risk management systems provide a framework for principals to determine whether they will exchange resources, without requiring a complete definition of their ...
Nathan Dimmock, András Belokosztolszki, Dav...
SIGDOC
2004
ACM
14 years 4 months ago
Automatic evaluation of aspects of document quality
Coh-Metrix is a web-based application currently in development that automatically evaluates text. It uses two central concepts from discourse processing: text-based cohesion and s...
David F. Dufty, Danielle S. McNamara, Max M. Louwe...
SIGUCCS
2004
ACM
14 years 4 months ago
Communities of practice: dare to share the knowledge
Communities of practice are not a new idea, but they are being looked at more closely as an important tool for learning and mastering knowledge challenges. Communities of practice...
Debbie Mojta