Sciweavers

2446 search results - page 375 / 490
» Principles of dataspace systems
Sort
View
HICSS
2010
IEEE
154views Biometrics» more  HICSS 2010»
14 years 4 months ago
Towards an Understanding of Social Software: The Case of Arinia
This paper presents the case of Arinia, a custommade piece of social software with strong similarities to today’s microblogging applications. Arinia has been in use in a medium-...
Stuart J. Barnes, Martin Böhringer, Christian...
CHI
2010
ACM
14 years 4 months ago
iCanDraw: using sketch recognition and corrective feedback to assist a user in drawing human faces
When asked to draw, many people are hesitant because they consider themselves unable to draw well. This paper describes the first system for a computer to provide direction and fe...
Daniel Dixon, Manoj Prasad, Tracy Hammond
ACSD
2009
IEEE
118views Hardware» more  ACSD 2009»
14 years 4 months ago
Verifying Deadlock- and Livelock Freedom in an SOA Scenario
In a service-oriented architecture (SOA), a service broker assigns a previously published service (stored in a service registry) to a service requester. It is desirable for the co...
Karsten Wolf, Christian Stahl, Janine Ott, Robert ...
IEEEARES
2009
IEEE
14 years 4 months ago
Estimating ToE Risk Level Using CVSS
—Security management is about calculated risk and requires continuous evaluation to ensure cost, time and resource effectiveness. Parts of which is to make future-oriented, costb...
Siv Hilde Houmb, Virginia N. L. Franqueira
AOSD
2009
ACM
14 years 4 months ago
Enforcing security for desktop clients using authority aspects
Desktop client applications interact with both local and remote resources. This is both a benefit in terms of the rich features desktop clients can provide, but also a security r...
Brett Cannon, Eric Wohlstadter