Sciweavers

8701 search results - page 1665 / 1741
» Protecting information on the Web
Sort
View
ICSE
2005
IEEE-ACM
14 years 10 months ago
Verification and change-impact analysis of access-control policies
Sensitive data are increasingly available on-line through the Web and other distributed protocols. This heightens the need to carefully control access to data. Control means not o...
Kathi Fisler, Shriram Krishnamurthi, Leo A. Meyero...
WWW
2009
ACM
14 years 4 months ago
Social search and discovery using a unified approach
: This talk describes a research project exploring new ways for augmenting search using multiple types and sources of social information. Our goal is to allow searching for all obj...
Einat Amitay, David Carmel, Nadav Har'El, Shila Of...
IEEECIT
2009
IEEE
14 years 4 months ago
A Highly Efficient Inter-domain Communication Channel
—With virtual machine technology, distributed services deployed in multiple cooperative virtual machines, such as multi-tier web services, may reside on one physical machine. Thi...
Hongyong Zang, Kuiyan Gu, Yaqiong Li, Yuzhong Sun,...
CIVR
2009
Springer
133views Image Analysis» more  CIVR 2009»
14 years 4 months ago
MonuAnno: automatic annotation of georeferenced landmarks images
Uploading tourist photographs is a popular activity on photo sharing platforms. The manual annotation of these images is a tedious process and the users often upload their images ...
Adrian Popescu, Pierre-Alain Moëllic
ESWS
2009
Springer
14 years 4 months ago
MoKi: The Enterprise Modelling Wiki
Abstract. Enterprise modelling focuses on the construction of a structured description, the so-called enterprise model, which represents aspects relevant to the activity of an ente...
Chiara Ghidini, Barbara Kump, Stefanie N. Lindstae...
« Prev « First page 1665 / 1741 Last » Next »