Sciweavers

5373 search results - page 955 / 1075
» Models and Motion Planning
Sort
View
IADIS
2004
15 years 5 months ago
Preliminary Steps in Designing and Implementing a Privilege Verifier for PMI
We have designed and deployed a system that uses X.509 public-key certificates (PKC) and attribute certificates (AC) for access control. This includes an authorization service for...
Diana Berbecaru, Antonio Lioy
APBC
2003
15 years 5 months ago
Towards Transparent Access to Multiple Biological Databanks
Nowadays, biologists use a number of large biological databanks to find relevant information for their research. Users of these databanks face a number of problems. One problem i...
Patrick Lambrix, Vaida Jakoniene
DAIS
2003
15 years 5 months ago
Middleware Support for Resource-Constrained Software Deployment
Abstract The JAMUS platform is dedicated to providing a safe runtime environment for untrusted Java application programs, while offering each of these programs access to the resour...
Nicolas Le Sommer, Frédéric Guidec
DGO
2003
121views Education» more  DGO 2003»
15 years 5 months ago
Extending Metadata Definitions by Automatically Extracting and Organizing Glossary Definitions
Metadata descriptions of database contents are required to build and use systems that access and deliver data in response to user requests. When numerous heterogeneous databases a...
Eduard H. Hovy, Andrew Philpot, Judith Klavans, Ul...
IJCAI
2001
15 years 5 months ago
Integrating Expectations from Different Sources to Help End Users Acquire Procedural Knowledge
Role-limiting approaches using explicit theories of problem-solving have been successful for acquiring knowledge from domain experts1 . However most systems using this approach do...
Jim Blythe