Sciweavers

646 search results - page 110 / 130
» Knowledge Management System Design using Extended Gaia
Sort
View
MMSEC
2006
ACM
102views Multimedia» more  MMSEC 2006»
14 years 3 months ago
Zero-knowledge watermark detector robust to sensitivity attacks
Current zero-knowledge watermark detectors are based on a linear correlation between the asset features and a given secret sequence. This detection function is susceptible of bein...
Juan Ramón Troncoso-Pastoriza, Fernando P&e...
PODS
2008
ACM
165views Database» more  PODS 2008»
14 years 10 months ago
Data exchange and schema mappings in open and closed worlds
In the study of data exchange one usually assumes an openworld semantics, making it possible to extend instances of target schemas. An alternative closed-world semantics only move...
Leonid Libkin, Cristina Sirangelo
FUNGAMES
2010
13 years 11 months ago
ajME: making game engines autonomic
Autonomic Computing is now showing its value as a solution to the increased complexities of maintaining computer systems and has been applied to many different fields. In this pap...
Pedro Martins, Julie A. McCann
SIGITE
2006
ACM
14 years 3 months ago
Does a virtual networking laboratory result in similar student achievement and satisfaction?
Delivery of content in networking and system administration curricula involves significant hands-on laboratory experience supplementing traditional classroom instruction at the Ro...
Edith A. Lawson, William Stackpole
ICC
2009
IEEE
130views Communications» more  ICC 2009»
14 years 4 months ago
Flexible Single Sign-On for SIP: Bridging the Identity Chasm
—Identity federation is a key requirement for today’s distributed services. This technology allows managed sharing of users’ identity information between identity providers (...
Pin Nie, Juha-Matti Tapio, Sasu Tarkoma, Jani Heik...