Sciweavers

23703 search results - page 4616 / 4741
» Learning from Demonstration
Sort
View
DBSEC
2004
170views Database» more  DBSEC 2004»
13 years 10 months ago
RBAC/MAC Security Analysis and Design for UML
In software construction, analysis investigates the boundary of a system (scope and requirements), its usage and access, and from a security perspective, who needs access to what ...
Thuong Doan, Steven A. Demurjian, Charles E. Phill...
CSREAPSC
2006
13 years 10 months ago
M2MI Service Discovery Middleware Framework
The Many-to-Many-Invocation (M2MI) Service Discovery Middleware Framework provides an API for publishing, providing, and using services in a serverless ad hoc network of devices im...
Hans-Peter Bischof, Joel Donado
DLOG
2004
13 years 10 months ago
Extended Query Facilities for Racer and an Application to Software-Engineering Problems
er reports on a pragmatic query language for Racer. The abstract syntax and semantics of this query language is defined. Next, the practical relevance of this query language is sh...
Volker Haarslev, Ralf Möller, Ragnhild Van De...
ECIS
2004
13 years 10 months ago
Implementing Information Systems to support knowledge work: an exploration of work motifs
The research presented in this paper is part of a larger study of the organizational impacts of information systems on knowledge work. The phase of the research reported in the pa...
Christopher J. Davis, Ellen M. Hunagel
ECIS
2004
13 years 10 months ago
Leveraging Theoretical Pluralism in qualitative IS research: The example of IS professionals' identity as a complex phenomenon
As Information Systems (IS) research increasingly acknowledges the importance of non-positivist approaches, the case for a plurality of theories to guide qualitative studies has g...
Jo-Ann Siregar, Michael T. K. Tan
« Prev « First page 4616 / 4741 Last » Next »