Sciweavers

695 search results - page 105 / 139
» Refactoring Feature Modules
Sort
View
SP
2007
IEEE
113views Security Privacy» more  SP 2007»
14 years 1 months ago
Usable Mandatory Integrity Protection for Operating Systems
Existing mandatory access control systems for operating systems are difficult to use. We identify several principles for designing usable access control systems and introduce the...
Ninghui Li, Ziqing Mao, Hong Chen
WISE
2007
Springer
14 years 1 months ago
Building the Presentation-Tier of Rich Web Applications with Hierarchical Components
Nowadays information systems are increasingly distributed and deployed within the Internet platform. Without any doubt, the World Wide Web represents the de facto standard platform...
Reda Kadri, Chouki Tibermacine, Vincent Le Gloahec
ACCV
2007
Springer
14 years 1 months ago
Flea, Do You Remember Me?
The ability to detect and recognize individuals is essential for an autonomous robot interacting with humans even if computational resources are usually rather limited. In general ...
Michael Grabner, Helmut Grabner, Joachim Pehserl, ...
ATAL
2007
Springer
14 years 1 months ago
F-trade: an agent-mining symbiont for financial services
The interaction and integration of agent technology and data mining presents prominent benefits to solve some of challenging issues in individual areas. For instance, data mining ...
Longbing Cao, Chengqi Zhang
AUSDM
2007
Springer
112views Data Mining» more  AUSDM 2007»
14 years 1 months ago
Measuring Data-Driven Ontology Changes using Text Mining
Most current ontology management systems concentrate on detecting usage-driven changes and representing changes formally in order to maintain the consistency. In this paper, we pr...
Majigsuren Enkhsaikhan, Wilson Wong, Wei Liu, Mark...