Sciweavers

19003 search results - page 41 / 3801
» We Need Assurance!
Sort
View
NDSS
1999
IEEE
14 years 1 days ago
Practical Approach to Anonymity in Large Scale Electronic Voting Schemes
Anonymity of ballots in electronic voting schemes usually relies on the existence of some kind of anonymous channel between voters and ballot collecting authorities. Currently, th...
Andreu Riera, Joan Borrell
DMDW
2001
232views Management» more  DMDW 2001»
13 years 9 months ago
Towards Data Warehouse Quality Metrics
Organizations are adopting datawarehouses to manage information efficiently as "the" main organizational asset. It is essential that we can assure the information qualit...
Coral Calero, Mario Piattini, Carolina Pascual, Ma...
CN
2008
73views more  CN 2008»
13 years 7 months ago
Resilient network admission control
Network admission control (NAC) limits the traffic in a network to avoid overload and to assure thereby the quality of service (QoS) for admitted flows. Overload may occur due to ...
Michael Menth, Stefan Kopf, Joachim Charzinski, Ka...
KES
2008
Springer
13 years 7 months ago
The User Centred Knowledge Model - t-UCK
In knowledge engineering, modelling knowledge is the process of structuring knowledge before implementation. A crucial part of system development depends on the acquiring and struc...
Anne Håkansson
ISCAS
2006
IEEE
109views Hardware» more  ISCAS 2006»
14 years 1 months ago
Adaptive multimedia access: from user needs to semantic personalisation
—We discuss the use of a reliable user requirements methodology for gathering essential data relating to user needs in advanced, personalised multimedia content applications. We ...
A. Evans, Miriam Fernández, David Vallet, P...