Sciweavers

220 search results - page 11 / 44
» Trusted business system model using context sensitiveness
Sort
View
SIGCPR
2006
ACM
346views Hardware» more  SIGCPR 2006»
14 years 2 months ago
An extension of the UTAUT model with e-quality, trust, and satisfaction constructs
This research seeks to validate a comprehensive model of quality in the context of e-business systems. It also extends the UTAUT model with e-quality, trust, and satisfaction cons...
Erin Cody-Allen, Rajiv Kishore
LREC
2008
125views Education» more  LREC 2008»
13 years 10 months ago
I saw TREE trees in the park: How to Correct Real-Word Spelling Mistakes
This paper presents a context sensitive spell checking system that uses mixed trigram models, and introduces a new empirically grounded method for building confusion sets. The pro...
Davide Fossati, Barbara Di Eugenio
PPDP
2001
Springer
14 years 1 months ago
Trust in the Pi-Calculus
We introduce a new system of trust analysis for concurrent and distributed systems using the π-calculus[13, 14, 15] as a modelling tool. A Type system using boolean annotations g...
Mark Hepburn, David Wright
BMCBI
2010
104views more  BMCBI 2010»
13 years 3 months ago
A systematic study of genome context methods: calibration, normalization and combination
Background: Genome context methods have been introduced in the last decade as automatic methods to predict functional relatedness between genes in a target genome using the patter...
Luciana Ferrer, Joseph M. Dale, Peter D. Karp
ECOOP
2009
Springer
14 years 9 months ago
Fine-Grained Access Control with Object-Sensitive Roles
Role-based access control (RBAC) is a common paradigm to ensure that users have sufficient rights to perform various system operations. In many cases though, traditional RBAC does ...
Jeffrey Fischer, Daniel Marino, Rupak Majumdar, To...