Sciweavers

2131 search results - page 365 / 427
» Multi-Agent System Development: Design, Runtime, and Analysi...
Sort
View
CSCW
1999
ACM
13 years 8 months ago
Layers of Silence, Arenas of Voice: The Ecology of Visible and Invisible Work
No work is inherently either visible or invisible. We always "see" work through a selection of indicators: straining muscles, finished artifacts, a changed state of affai...
Susan Leigh Star, Anselm Strauss
GRID
2008
Springer
13 years 8 months ago
A Secure Grid Medical Data Manager Interfaced to the gLite Middleware
The medical community is producing and manipulating a tremendous volume of digital data for which computerized archiving, processing and analysis is needed. Grid infrastructures ar...
Johan Montagnat, Ákos Frohner, Daniel Jouve...
CIKM
2010
Springer
13 years 7 months ago
Automatic metadata extraction from multilingual enterprise content
Enterprises provide professionally authored content about their products/services in different languages for use in web sites and customer care. For customer care, personalization...
Melike Sah, Vincent Wade
SICHERHEIT
2010
13 years 7 months ago
Quantifying the Attack Surface of a Web Application
Abstract: The attack surface of a system represents the exposure of application objects to attackers and is affected primarily by architecture and design decisions. Given otherwise...
Thomas Heumann, Sven Türpe, Jörg Keller
SOUPS
2006
ACM
14 years 3 months ago
Intentional access management: making access control usable for end-users
The usability of access control mechanisms in modern distributed systems has been widely criticized but little studied. In this paper, we carefully examine one such widely deploye...
Xiang Cao, Lee Iverson