Sciweavers

SAC
2002
ACM
13 years 11 months ago
Hyperrelations in version space
A version space is a set of all hypotheses consistent with a given set of training examples, delimited by the specific boundary and the general boundary. In existing studies [5, 6...
Hui Wang, Ivo Düntsch, Günther Gediga, A...
SAC
2002
ACM
13 years 11 months ago
An agreement centric access control mechanism for business to business e-commerce
We argue that matrix-based models are inadequate for regulating business to business (or B2B, for short) e-commerce due to the diversity, complexity and potential large number of ...
Victoria Ungureanu
SAC
2002
ACM
13 years 11 months ago
Certificates for mobile code security
Hock Kim Tan, Luc Moreau
SAC
2002
ACM
13 years 11 months ago
Mobile delivery of news using hierarchical query-biased summaries
This paper presents the results of a study aimed at measuring the usefulness of presenting the results of an Information Retrieval search on WAP mobile phones. The experimentation...
Simon O. Sweeney, Fabio Crestani, Anastasios Tombr...
SAC
2002
ACM
13 years 11 months ago
Contradictions and critical issues during system evolution
In this paper the issue of system evolution is addressed. Activity Theory and the concept of exapansive cycles are reviewed as theories to explain systemic evolution. Contradictio...
Mark-Alexander Sujan, Antonio Rizzo, Alberto Pasqu...
SAC
2002
ACM
13 years 11 months ago
HTTP redirection for replica catalogue lookups in data grids
1 Data distribution and replication in distributed systems require special purpose middleware tools for accessing replicated data. Data Grids, special forms of a systems distribute...
Heinz Stockinger, Andrew Hanushevsky
SAC
2002
ACM
13 years 11 months ago
Collaborative attack modeling
Avoidance and discovery of security vulnerabilities in information systems requires awareness of typical risks and a good understanding of vulnerabilities and their exploitations....
Jan Steffan, Markus Schumacher