Sciweavers

539 search results - page 44 / 108
» Supporting the Flow of Information Through Constellations of...
Sort
View
IEEEIAS
2008
IEEE
14 years 2 months ago
Developing a Security Typed Java Servlet
: The Lack of security policy enforcement in web development languages is one of the most important challenges in web application systems development, as there is no formal check f...
Doaa Hassan, Sherif El-Kassas, Ibrahim Ziedan
HICSS
2007
IEEE
119views Biometrics» more  HICSS 2007»
14 years 2 months ago
Towards Ubiquitous Government Services through Adaptations with Context and Views in a Three-Tier Architecture
With the recent advances in mobile technologies and infrastructures, citizens start to demand for not just mobile but also ubiquitous access to e-government services. Further with...
Dickson K. W. Chiu, Dan Hong, S. C. Cheung, Eleann...
ICDE
2006
IEEE
208views Database» more  ICDE 2006»
14 years 2 months ago
Integrating Databases into the Semantic Web through an Ontology-Based Framework
To realize the Semantic Web, it will be necessary to make existing database content available for emerging Semantic Web applications, such as web agents and services, which use on...
Dejing Dou, Paea LePendu, Shiwoong Kim, Peishen Qi
DSN
2005
IEEE
14 years 1 months ago
User Interface Dependability through Goal-Error Prevention
User interfaces form a critical coupling between humans and computers. When the interface fails, the user fails, and the mission is lost. For example, in computer security applica...
Robert W. Reeder, Roy A. Maxion
LREC
2008
90views Education» more  LREC 2008»
13 years 9 months ago
Revealing Relations between Open and Closed Answers in Questionnaires through Text Clustering Evaluation
Open answers in questionnaires contain valuable information that is very time-consuming to analyze manually. We present a method for hypothesis generation from questionnaires base...
Magnus Rosell, Sumithra Velupillai