Sciweavers

759 search results - page 49 / 152
» What Can Be Implemented Anonymously
Sort
View
HICSS
2007
IEEE
93views Biometrics» more  HICSS 2007»
14 years 4 months ago
Using Systems Dynamics to Explore Effects of Counterterrorism Policy
This paper suggests that the effects of counterterrorism policy on Violent Non-State Actors can be explored via systems dynamics. Specifically, we create a descriptive model of th...
Tara Leweling, Otto Sieber
ICDE
2006
IEEE
152views Database» more  ICDE 2006»
14 years 4 months ago
Redundancy Awareness in SQL Queries
In this paper, we study SQL queries with aggregate subqueries that share common tables and conditions with the outer query. While several approaches can deal with such queries, th...
Bin Cao, Antonio Badia
EMSOFT
2004
Springer
14 years 3 months ago
An event detection algebra for reactive systems
In reactive systems, execution is driven by external events to which the system should respond with appropriate actions. Such events can be simple, but systems are often supposed ...
Jan Carlson, Björn Lisper
GC
2004
Springer
14 years 3 months ago
For-LySa: UML for Authentication Analysis
The DEGAS project aims at enriching standard UML-centred development environments in such a way that the developers of global applications can exploit automated formal analyses wit...
Mikael Buchholtz, Carlo Montangero, Lara Perrone, ...
CHI
1997
ACM
14 years 2 months ago
How to Personalize the Web
Agents can personalize otherwise impersonal computational systems. The World Wide Web presents the same appearance to every user regardless of that user’s past activity. Web Bro...
Rob Barrett, Paul P. Maglio, Daniel C. Kellem