Sciweavers

96 search results - page 17 / 20
» On resolving Conflicts between Arguments
Sort
View
CCS
2006
ACM
13 years 11 months ago
Defeasible security policy composition for web services
The ability to automatically compose security policies created by multiple organizations is fundamental to the development of scalable security systems. The diversity of policies ...
Adam J. Lee, Jodie P. Boyer, Lars E. Olson, Carl A...
BCSHCI
2008
13 years 8 months ago
Low cost prototyping: part 1, or how to produce better ideas faster by getting user reactions early and often
Although approaches to User Centered Software Development have existed for almost 20 years a rift still exists between theory and practice. In practice, many software projects are...
Stephen Brown, Andreas Holzinger
FDBS
2001
108views more  FDBS 2001»
13 years 8 months ago
Combining a Formal with an Example-driven Approach for Data Integration
Integrating data sources is a general problem in many scenarios. The main problem is the heterogeneity between data sources which were created and developed separately. In the lit...
Ingolf Geist, Kai-Uwe Sattler, Ingo Schmitt
JSW
2008
136views more  JSW 2008»
13 years 7 months ago
Collaborative Product Configuration: Formalization and Efficient Algorithms for Dependency Analysis
- In the Software Product Line approach, product configuration is a key activity in which stakeholders choose features for a product. This activity is critical in the sense that ca...
Marcílio Mendonça, Donald D. Cowan, ...
NN
2006
Springer
101views Neural Networks» more  NN 2006»
13 years 7 months ago
A robot model of the basal ganglia: Behavior and intrinsic processing
The existence of multiple parallel loops connecting sensorimotor systems to the basal ganglia has given rise to proposals that these nuclei serve as a selection mechanism resolvin...
Tony J. Prescott, Fernando M. Montes Gonzál...