Sciweavers

823 search results - page 157 / 165
» The Participatory Paradigm for Applied Information Systems R...
Sort
View
ICSE
2005
IEEE-ACM
14 years 8 months ago
Verification and change-impact analysis of access-control policies
Sensitive data are increasingly available on-line through the Web and other distributed protocols. This heightens the need to carefully control access to data. Control means not o...
Kathi Fisler, Shriram Krishnamurthi, Leo A. Meyero...
ISSTA
2010
ACM
13 years 11 months ago
Automatic detection of unsafe component loadings
Dynamic loading of software components (e.g., libraries or modules) is a widely used mechanism for improved system modularity and flexibility. Correct component resolution is cri...
Taeho Kwon, Zhendong Su
BMCBI
2008
150views more  BMCBI 2008»
13 years 8 months ago
Natural Language Processing in aid of FlyBase curators
Background: Despite increasing interest in applying Natural Language Processing (NLP) to biomedical text, whether this technology can facilitate tasks such as database curation re...
Nikiforos Karamanis, Ruth Seal, Ian Lewin, Peter M...
EDM
2009
184views Data Mining» more  EDM 2009»
13 years 5 months ago
Process Mining Online Assessment Data
Traditional data mining techniques have been extensively applied to find interesting patterns, build descriptive and predictive models from large volumes of data accumulated throug...
Mykola Pechenizkiy, Nikola Trcka, Ekaterina Vasily...
EUROSSC
2009
Springer
14 years 2 months ago
Time-Lag as Limiting Factor for Indoor Walking Navigation
Several navigation situations can be imagined where visual cueing is not practical or unfeasible, and where the hands are required exclusively for a certain task. The utilization o...
Andreas Riener, Markus Straub, Alois Ferscha