Sciweavers

23703 search results - page 4616 / 4741
» Learning from Demonstration
Sort
View
133
Voted
DBSEC
2004
170views Database» more  DBSEC 2004»
15 years 4 months ago
RBAC/MAC Security Analysis and Design for UML
In software construction, analysis investigates the boundary of a system (scope and requirements), its usage and access, and from a security perspective, who needs access to what ...
Thuong Doan, Steven A. Demurjian, Charles E. Phill...
141
Voted
CSREAPSC
2006
15 years 4 months ago
M2MI Service Discovery Middleware Framework
The Many-to-Many-Invocation (M2MI) Service Discovery Middleware Framework provides an API for publishing, providing, and using services in a serverless ad hoc network of devices im...
Hans-Peter Bischof, Joel Donado
130
Voted
DLOG
2004
15 years 4 months ago
Extended Query Facilities for Racer and an Application to Software-Engineering Problems
er reports on a pragmatic query language for Racer. The abstract syntax and semantics of this query language is defined. Next, the practical relevance of this query language is sh...
Volker Haarslev, Ralf Möller, Ragnhild Van De...
115
Voted
ECIS
2004
15 years 4 months ago
Implementing Information Systems to support knowledge work: an exploration of work motifs
The research presented in this paper is part of a larger study of the organizational impacts of information systems on knowledge work. The phase of the research reported in the pa...
Christopher J. Davis, Ellen M. Hunagel
ECIS
2004
15 years 4 months ago
Leveraging Theoretical Pluralism in qualitative IS research: The example of IS professionals' identity as a complex phenomenon
As Information Systems (IS) research increasingly acknowledges the importance of non-positivist approaches, the case for a plurality of theories to guide qualitative studies has g...
Jo-Ann Siregar, Michael T. K. Tan
« Prev « First page 4616 / 4741 Last » Next »