Sciweavers

448 search results - page 67 / 90
» Who is in Control
Sort
View
121
Voted
CORR
2012
Springer
205views Education» more  CORR 2012»
13 years 11 months ago
Check Your Data Freedom: A Taxonomy to Assess Life Science Database Openness
Molecular biology data are subject to terms of use that vary widely between databases and curating institutions. This research presents a taxonomy of contractual and technical res...
Mélanie Dulong de Rosnay
SIGMOD
2007
ACM
178views Database» more  SIGMOD 2007»
16 years 3 months ago
Quality is in the eye of the beholder: towards user-centric web-databases
The proliferation of database-driven web sites (or web-databases) has brought upon a plethora of applications where both Quality of Service (QoS) and Quality of Data (QoD) are of ...
Huiming Qu, Jie Xu, Alexandros Labrinidis
AIED
2009
Springer
15 years 10 months ago
To Tutor or Not to Tutor: That is the Question
Intelligent tutoring systems often rely on interactive tutored problem solving to help students learn math, which requires students to work through problems step-by-step while the ...
Leena M. Razzaq, Neil T. Heffernan
122
Voted
SP
2006
IEEE
148views Security Privacy» more  SP 2006»
15 years 9 months ago
SubVirt: Implementing malware with virtual machines
Attackers and defenders of computer systems both strive to gain complete control over the system. To maximize their control, both attackers and defenders have migrated to low-leve...
Samuel T. King, Peter M. Chen, Yi-Min Wang, Chad V...
125
Voted
TGC
2005
Springer
15 years 9 months ago
Types for Security in a Mobile World
Our society is increasingly moving towards richer forms of information exchange where mobility of processes and devices plays a prominent role. This tendency has prompted the acade...
Adriana B. Compagnoni, Elsa L. Gunter