Sciweavers

708 search results - page 73 / 142
» Support for Informal Information Use and its Formalization i...
Sort
View
IEEEIAS
2007
IEEE
14 years 3 months ago
A Purpose-Based Access Control Model
: Achieving privacy preservation in a data-sharing computing environment is becoming a challenging problem. Some organisations may have published privacy policies, which promise pr...
Naikuo Yang, Howard Barringer, Ning Zhang
CHI
2005
ACM
14 years 9 months ago
Beyond being in the lab: using multi-agent modeling to isolate competing hypotheses
In studies of virtual teams, it is difficult to determine pure effects of geographic isolation and uneven communication technology. We developed a multi-agent computer model in Ne...
Ning Nan, Erik W. Johnston, Judith S. Olson, Natha...
RV
2010
Springer
220views Hardware» more  RV 2010»
13 years 7 months ago
Runtime Verification with the RV System
The RV system is the first system to merge the benefits of Runtime Monitoring with Predictive Analysis. The Runtime Monitoring portion of RV is based on the successful Monitoring O...
Patrick O'Neil Meredith, Grigore Rosu
ICSE
2008
IEEE-ACM
14 years 10 months ago
Precise memory leak detection for java software using container profiling
A memory leak in a Java program occurs when object references that are no longer needed are unnecessarily maintained. Such leaks are difficult to understand because static analyse...
Guoqing Xu, Atanas Rountev
HICSS
1999
IEEE
87views Biometrics» more  HICSS 1999»
14 years 1 months ago
Developing a CALS/EC Engine of the ELECTROPIA in Korea
The ELECTROPIA is a CALS/EC engine developed by the Korea CALS/EC Association composed of the government, several universities, and many small and big companies in Korea, in order...
Sounghie Kim, Donghoon Lee, Kijin Jang, Choong-Hwa...