Sciweavers

373 search results - page 44 / 75
» Trustworthy Information: Concepts and Mechanisms
Sort
View
CANDT
2009
13 years 11 months ago
Active artifacts as bridges between context and community knowledge sources
The aim of the paper is twofold: i) understanding how to provide additional information that is reflective of current organizational context in knowledge production and use; ii) p...
Federico Cabitza, Carla Simone
ACL
1998
13 years 9 months ago
Processing Unknown Words in HPSG
The lexical acquisition system presented in this paper incrementallyupdates linguisticproperties of unknown words inferred from their surrounding context by parsing sentences with...
Petra Barg, Markus Walther
CCS
2011
ACM
12 years 7 months ago
Fortifying web-based applications automatically
Browser designers create security mechanisms to help web developers protect web applications, but web developers are usually slow to use these features in web-based applications (...
Shuo Tang, Nathan Dautenhahn, Samuel T. King
CVPR
2007
IEEE
14 years 9 months ago
OpenVL: Towards A Novel Software Architecture for Computer Vision
This paper presents our progress on OpenVL - a novel software architecture to address efficiency through facilitating hardware acceleration, reusability and scalability for comput...
Changsong Shen, S. Sidney Fels, James J. Little
EUC
2007
Springer
14 years 1 months ago
Obligations for Privacy and Confidentiality in Distributed Transactions
Existing access control systems are typically unilateral in that the enterprise service provider assigns the access rights and makes the access control decisions, and there is no n...
Uche M. Mbanaso, G. S. Cooper, David W. Chadwick, ...