Reflections on System Trustworthiness - 6 System Composition: Problems and Potentials (Englisch)
- Neue Suche nach: Neumann, Peter G.
- Neue Suche nach: Neumann, Peter G.
In:
Advances in computers
;
70
; 285-293
;
2007
-
ISSN:
- Aufsatz (Zeitschrift) / Print
-
Titel:Reflections on System Trustworthiness - 6 System Composition: Problems and Potentials
-
Beteiligte:Neumann, Peter G. ( Autor:in )
-
Erschienen in:Advances in computers ; 70 ; 285-293
-
Verlag:
- Neue Suche nach: Elsevier, Academic Press
-
Erscheinungsort:Amsterdam [u.a.]
-
Erscheinungsdatum:2007
-
ISSN:
-
ZDBID:
-
Medientyp:Aufsatz (Zeitschrift)
-
Format:Print
-
Sprache:Englisch
- Neue Suche nach: 54.00 / 54.00
- Weitere Informationen zu Basisklassifikation
- Neue Suche nach: 770/3155
-
Schlagwörter:
-
Klassifikation:
-
Datenquelle:
Inhaltsverzeichnis – Band 70
Zeige alle Jahrgänge und Ausgaben
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Designing Networked Handheld Devices to Enhance School LearningRoschelle, J. / Patton, C. / Tatar, D. et al. | 2007
- 2
-
Designing Networked Handheld Devices to Enhance School Learning - 1 IntroductionRoschelle, Jeremy et al. | 2007
- 6
-
Designing Networked Handheld Devices to Enhance School Learning - 2 Historical Large Scale SuccessesRoschelle, Jeremy et al. | 2007
- 20
-
Designing Networked Handheld Devices to Enhance School Learning - 3 Technology Context for Learning ApplicationsRoschelle, Jeremy et al. | 2007
- 32
-
Designing Networked Handheld Devices to Enhance School Learning - 4 Overarching Ideas from the Learning SciencesRoschelle, Jeremy et al. | 2007
- 43
-
Designing Networked Handheld Devices to Enhance School Learning - 5 Design of Instructional TechnologiesRoschelle, Jeremy et al. | 2007
- 47
-
Designing Networked Handheld Devices to Enhance School Learning - 6 Looking ForwardRoschelle, Jeremy et al. | 2007
- 49
-
Designing Networked Handheld Devices to Enhance School Learning - 7 ConclusionRoschelle, Jeremy et al. | 2007
- 51
-
Designing Networked Handheld Devices to Enhance School Learning - Acknowledgements| 2007
- 52
-
Designing Networked Handheld Devices to Enhance School Learning - References| 2007
- 61
-
Interactive Explanatory and Descriptive Natural-Language Based Dialogue for Intelligent Information FilteringAtkinson, J. / Ferreira, A. et al. | 2007
- 62
-
Interactive Explanatory and Descriptive Natural-Language Based Dialogue for Intelligent Information Filtering - 1 IntroductionAtkinson, John et al. | 2007
- 64
-
Interactive Explanatory and Descriptive Natural-Language Based Dialogue for Intelligent Information Filtering - 2 Related WorkAtkinson, John et al. | 2007
- 73
-
Interactive Explanatory and Descriptive Natural-Language Based Dialogue for Intelligent Information Filtering - 3 A Model for Interactive Web-Driven and Dialogue-Based SearchAtkinson, John et al. | 2007
- 89
-
Interactive Explanatory and Descriptive Natural-Language Based Dialogue for Intelligent Information Filtering - 4 Analysis and ResultsAtkinson, John et al. | 2007
- 100
-
Interactive Explanatory and Descriptive Natural-Language Based Dialogue for Intelligent Information Filtering - 5 ConclusionsAtkinson, John et al. | 2007
- 101
-
Interactive Explanatory and Descriptive Natural-Language Based Dialogue for Intelligent Information Filtering - References| 2007
- 101
-
Interactive Explanatory and Descriptive Natural-Language Based Dialogue for Intelligent Information Filtering - Acknowledgements| 2007
- 105
-
A Tour of Language Customization ConceptsAtkinson, C. / Kuhne, T. et al. | 2007
- 106
-
A Tour of Language Customization Concepts - 1 IntroductionAtkinson, Colin et al. | 2007
- 107
-
A Tour of Language Customization Concepts - 2 Languages, Abstraction and Domain-SpecificityAtkinson, Colin et al. | 2007
- 120
-
A Tour of Language Customization Concepts - 3 Derivation TypesAtkinson, Colin et al. | 2007
- 127
-
A Tour of Language Customization Concepts - 4 Lightweight Language CustomizationAtkinson, Colin et al. | 2007
- 133
-
A Tour of Language Customization Concepts - 5 Customization Support EnvironmentsAtkinson, Colin et al. | 2007
- 138
-
A Tour of Language Customization Concepts - 6 Ontological MetalevelsAtkinson, Colin et al. | 2007
- 148
-
A Tour of Language Customization Concepts - 7 Orthogonal Classification ArchitectureAtkinson, Colin et al. | 2007
- 150
-
A Tour of Language Customization Concepts - 8 Languages versus LibrariesAtkinson, Colin et al. | 2007
- 154
-
A Tour of Language Customization Concepts - 9 TransformationsAtkinson, Colin et al. | 2007
- 159
-
A Tour of Language Customization Concepts - 10 ConclusionAtkinson, Colin et al. | 2007
- 160
-
A Tour of Language Customization Concepts - References| 2007
- 163
-
Advances in Business Transformation TechnologiesLee, J. et al. | 2007
- 165
-
Advances in Business Transformation Technologies - 1 IntroductionLee, Juhnyoung et al. | 2007
- 169
-
Advances in Business Transformation Technologies - 2 Value-Oriented, Model-Driven Business TransformationLee, Juhnyoung et al. | 2007
- 187
-
Advances in Business Transformation Technologies - 3 Model-Driven Ontology EngineeringLee, Juhnyoung et al. | 2007
- 203
-
Advances in Business Transformation Technologies - 4 Business Process Composition with Web ServicesLee, Juhnyoung et al. | 2007
- 218
-
Advances in Business Transformation Technologies - Appendix A: Acronyms| 2007
- 218
-
Advances in Business Transformation Technologies - Acknowledgements| 2007
- 219
-
Advances in Business Transformation Technologies - References| 2007
- 223
-
Phish Phactors: Offensive and Defensive StrategiesBerghel, H. / Carpinter, J. / Jo, J.-Y. et al. | 2007
- 225
-
Phish Phactors: Offensive and Defensive Strategies - 1 IntroductionBerghel, Hal et al. | 2007
- 233
-
Phish Phactors: Offensive and Defensive Strategies - 2 Core Phishing TechniquesBerghel, Hal et al. | 2007
- 242
-
Phish Phactors: Offensive and Defensive Strategies - 3 Advanced Phishing TechniquesBerghel, Hal et al. | 2007
- 254
-
Phish Phactors: Offensive and Defensive Strategies - 4 Anti-Phishing TechniquesBerghel, Hal et al. | 2007
- 261
-
Phish Phactors: Offensive and Defensive Strategies - 5 Comprehensive Anti-Phishing EffortsBerghel, Hal et al. | 2007
- 265
-
Phish Phactors: Offensive and Defensive Strategies - References| 2007
- 265
-
Phish Phactors: Offensive and Defensive Strategies - Acknowledgements| 2007
- 265
-
Phish Phactors: Offensive and Defensive Strategies - 6 ConclusionBerghel, Hal et al. | 2007
- 269
-
Reflections on System TrustworthinessNeumann, P. G. et al. | 2007
- 270
-
Reflections on System Trustworthiness - 1 A Total-System PerspectiveNeumann, Peter G. et al. | 2007
- 271
-
Reflections on System Trustworthiness - 2 Anticipating DisastersNeumann, Peter G. et al. | 2007
- 273
-
Reflections on System Trustworthiness - 3 TrustworthinessNeumann, Peter G. et al. | 2007
- 275
-
Reflections on System Trustworthiness - 4 Risks in Trusting UntrustworthinessNeumann, Peter G. et al. | 2007
- 277
-
Reflections on System Trustworthiness - 5 Principles for Developing Trustworthy SystemsNeumann, Peter G. et al. | 2007
- 285
-
Reflections on System Trustworthiness - 6 System Composition: Problems and PotentialsNeumann, Peter G. et al. | 2007
- 294
-
Reflections on System Trustworthiness - 7 A Crisis in Information System SecurityNeumann, Peter G. et al. | 2007
- 295
-
Reflections on System Trustworthiness - 8 Optimistic OptimizationNeumann, Peter G. et al. | 2007
- 297
-
Reflections on System Trustworthiness - 9 An Example: Risks in Electronic Voting SystemsNeumann, Peter G. et al. | 2007
- 300
-
Reflections on System Trustworthiness - 10 The Need for Risk AwarenessNeumann, Peter G. et al. | 2007
- 302
-
Reflections on System Trustworthiness - 11 Risks of MisinformationNeumann, Peter G. et al. | 2007
- 304
-
Reflections on System Trustworthiness - 12 Boon or Bane?Neumann, Peter G. et al. | 2007
- 306
-
Reflections on System Trustworthiness - Acknowledgements| 2007
- 306
-
Reflections on System Trustworthiness - References| 2007
- 311
-
AUTHOR INDEX| 2007
- 319
-
SUBJECT INDEX| 2007
- 335
-
CONTENTS OF VOLUMES IN THIS SERIES| 2007
-
PREFACE| 2007
-
CONTRIBUTORS| 2007