Sciweavers

711 search results - page 126 / 143
» The organizing vision of integrated health information syste...
Sort
View
IJACTAICIT
2010
192views more  IJACTAICIT 2010»
13 years 4 months ago
Service Level Security using Expected Clandestine Figure for Corroboration of Web Service Consumer
In the e-age, internet and e-affairs are the composite blend of business process and technology; the organization must retain the state of computing system or risk malicious assau...
M. S. Saleem Basha
SP
1989
IEEE
160views Security Privacy» more  SP 1989»
13 years 11 months ago
The Chinese Wall Security Policy
Everyone who has seen the movie Wall Street will have seen a commercial security policy in action. The recent work of Clark and Wilson and the WIPCIS initiative (the Workshop on I...
D. F. C. Brewer, M. J. Nash
AMW
2009
13 years 8 months ago
Consistent Query Answering in Data Warehouses
Abstract. A Data Warehouse (DW) is a data repository that organizes and physically integrates data from multiple sources under special kinds of schemas. A DW is composed by a set o...
Leopoldo E. Bertossi, Loreto Bravo, Mónica ...
AROBOTS
2002
102views more  AROBOTS 2002»
13 years 7 months ago
Recognition of Affective Communicative Intent in Robot-Directed Speech
Human speech provides a natural and intuitive interface for both communicating with humanoid robots as well as for teaching them. In general, the acoustic pattern of speech contain...
Cynthia Breazeal, Lijin Aryananda
GROUP
2009
ACM
14 years 2 days ago
Musical fingerprints: collaboration around home media collections
As people collect more and more digital music, photos, and video, the growing scale of the collection challenges how families share and collaborate around home media collections. ...
Robin Sease, David W. McDonald