Sciweavers

1795 search results - page 169 / 359
» Security Models and Information Flow
Sort
View
GIL
2011
14 years 3 months ago
Information Services for Agri-Food Supply Chains - A Framework for Development
Abstract: Several global developments such as the growing demand for bioenergy, limits in the availability of water and diminishing production resources as well as sector-wide cris...
Richard J. Lehmann, Robert Reiche, Melanie Fritz, ...
ENTCS
2000
112views more  ENTCS 2000»
15 years 3 months ago
Typed Multiset Rewriting Specifications of Security Protocols
The language MSR has successfully been used in the past to prove undecidability about security protocols modeled according to the Dolev-Yao abstraction. In this paper, we revise t...
Iliano Cervesato
IEEEARES
2007
IEEE
15 years 10 months ago
Context-Dependent Access Control for Contextual Information
Abstract— Following Mark Weiser’s vision of ubiquitous computing and calm technology, computer systems should run in the background, preferably without the user noticing it at ...
Christin Groba, Stephan Grob, Thomas Springer
RECOMB
2003
Springer
16 years 4 months ago
Accurate detection of very sparse sequence motifs
Protein sequence alignments are more reliable the shorter the evolutionary distance. Here, we align distantly related proteins using many closely spaced intermediate sequences as ...
Andreas Heger, Michael Lappe, Liisa Holm
153
Voted
HCI
2009
15 years 1 months ago
Using Graphical Models for an Intelligent Mixed-Initiative Dialog Management System
The main goal of dialog management is to provide all information needed to perform e. g. a SQL-query, a navigation task, etc. Two principal approaches for dialog management systems...
Stefan Schwärzler, Günther Ruske, Frank ...