Sciweavers

650 search results - page 94 / 130
» Privacy in Non-private Environments
Sort
View
SIGCSE
2006
ACM
144views Education» more  SIGCSE 2006»
14 years 2 months ago
Case-based analysis: a practical tool for teaching computer ethics
Case-based analysis is a bottom-up methodology for ethical reasoning. In a teaching environment, it can be a useful alternative to top-down methods, such as Kantianism, utilitaria...
Michael J. Quinn
GROUP
2005
ACM
14 years 2 months ago
Real-world oriented information sharing using social networks
While users disseminate various information in the open and widely distributed environment of the Semantic Web, determination of who shares access to particular information is at ...
Junichiro Mori, Tatsuhiko Sugiyama, Yutaka Matsuo
OOPSLA
2005
Springer
14 years 2 months ago
Using predicate fields in a highly flexible industrial control system
Predicate fields allow an object’s structure to vary at runtime based on the object’s state: a predicate field is present or not, depending on the values of other fields. P...
Shay Artzi, Michael D. Ernst
OOPSLA
2005
Springer
14 years 2 months ago
CodeQuest: querying source code with datalog
We describe CodeQuest, a system for querying source code. It combines two previous proposals, namely the use of logic programming and database system. Experiments (on projects ran...
Elnar Hajiyev, Mathieu Verbaere, Oege de Moor, Kri...
ISI
2004
Springer
14 years 2 months ago
Critical Infrastructure Integration Modeling and Simulation
The protection of critical infrastructures, such as electrical power grids, has become a primary concern of many nation states in recent years. Critical infrastructures involve mul...
William J. Tolone, David Wilson, Anita Raja, Wei-N...