Sciweavers

6952 search results - page 1336 / 1391
» The information integrity imperative
Sort
View
ALS
2003
Springer
14 years 1 months ago
Not Everything We Know We Learned
This is foremost a methodological contribution. It focuses on the foundation of anticipation and the pertinent implications that anticipation has on learning (theory and experiment...
Mihai Nadin
ATAL
2003
Springer
14 years 1 months ago
Behaviors that emerge from emotion and cognition: implementation and evaluation of a symbolic-connectionist architecture
This paper describes the implementation and evaluation of a framework for modeling emotions in complex, decision-making agents. Sponsored by U.S. Army Research Institute (ARI), th...
Amy E. Henninger, Randolph M. Jones, Eric Chown
DRM
2003
Springer
14 years 1 months ago
Obfuscation of design intent in object-oriented applications
Protection of digital data from unauthorized access is of paramount importance. In the past several years, much research has concentrated on protecting data from the standpoint of...
Mikhail Sosonkin, Gleb Naumovich, Nasir D. Memon
EWSPT
2003
Springer
14 years 1 months ago
Providing Highly Automated and Generic Means for Software Deployment Process
We present a new approach for the management and enactment of deployment process by a deployment processor ORYA (Open enviRonment to deploY Applications). ORYA aims to integrate te...
Vincent Lestideau, Noureddine Belkhatir
GCC
2003
Springer
14 years 1 months ago
Constructing Secure Web Service Based on XML
The paper discusses XML security key technologies related with security of Web service. Based on these discussions, Web service is integrated with some mature security architecture...
Shaomin Zhang, Baoyi Wang, Lihua Zhou
« Prev « First page 1336 / 1391 Last » Next »