Sciweavers

2897 search results - page 519 / 580
» Mobile Code Security
Sort
View
HICSS
2009
IEEE
126views Biometrics» more  HICSS 2009»
14 years 2 months ago
Specifying and Analyzing Workflows for Automated Identification and Data Capture
Humans use computers to carry out tasks that neither is able to do easily alone: humans provide eyes, hands, and judgment while computers provide computation, networking, and stor...
Elsa L. Gunter, Ayesha Yasmeen, Carl A. Gunter, An...
ICLP
2007
Springer
14 years 2 months ago
User-Definable Resource Bounds Analysis for Logic Programs
We present a static analysis that infers both upper and lower bounds on the usage that a logic program makes of a set of user-definable resources. The inferred bounds will in gener...
Jorge Navas, Edison Mera, Pedro López-Garc&...
DLOG
2008
14 years 14 days ago
Identifying Objects Over Time with Description Logics
A fundamental requirement for cooperating agents is to agree on a selection of component values of objects that can be used for reliably communicating references to the objects, to...
David Toman, Grant E. Weddell
IIWAS
2008
13 years 11 months ago
Using conditional transformations for semantic user interface adaptation
The rapid growth of mobile Internet use requires highly flexible and adaptable user interfaces for web applications. Contextual data from various sources as for example device HMI...
Pascal Bihler, Merlin Fotsing, Günter Kniesel...
ECIS
2004
13 years 11 months ago
The implementation and use of conceptual standards - the case of the rds-tmc service
The topic of the paper concerns the implementation and use of standards. The standards which are in focus in the paper include conceptual models and descriptions of the functionali...
Owen Eriksson, Anders Forsman