Sciweavers

317 search results - page 39 / 64
» Who gives a tweet
Sort
View
ISSA
2004
13 years 10 months ago
A Logic-Based Access Control Approach For Web Services
Web Services technology enables organisations to exploit software as a service. Services are accessed by method invocations. Method interfaces are described and published, and may...
Marijke Coetzee
NIPS
2004
13 years 10 months ago
Active Learning for Anomaly and Rare-Category Detection
We introduce a novel active-learning scenario in which a user wants to work with a learning algorithm to identify useful anomalies. These are distinguished from the traditional st...
Dan Pelleg, Andrew W. Moore
IADIS
2003
13 years 10 months ago
Accessible and Usable Internet System Design
The social concept “fragmented group” – is disabling people because it does not provide access to products and services to an enormous segment. Nobody, if they consciously t...
Runa Jesmin
ECIS
2000
13 years 10 months ago
Virtual Reality and the Tourism Product: Substitution or Complement?
this paper describes a small empirical study aimed at attempting to give an answer to the question: "will virtual reality provide a substitute for the tourism product"? I...
Silvia Sussmann, Hugo J. Vanhegan
WSC
1997
13 years 10 months ago
Business Process Modeling with SIMPROCESS
This paper gives an overview of business process modeling with SIMPROCESS, its applications, unique features, basic and advanced modeling constructs, and benefits. 1 WHAT IS SIMPR...
Scott Swegles