Sciweavers

1460 search results - page 264 / 292
» A Meta-Modeling Approach to Web Services
Sort
View
PERCOM
2005
ACM
14 years 9 months ago
Exploiting Information Relationships for Access Control
Pervasive computing environments offer a multitude of information services that provide potentially complex types of information. Therefore, when running access control for sensit...
Urs Hengartner, Peter Steenkiste
EDBT
2010
ACM
200views Database» more  EDBT 2010»
14 years 5 months ago
Rewrite techniques for performance optimization of schema matching processes
A recurring manual task in data integration, ontology alignment or model management is finding mappings between complex meta data structures. In order to reduce the manual effor...
Eric Peukert, Henrike Berthold, Erhard Rahm
EMS
2009
IEEE
14 years 5 months ago
Simulation of a Smart Grid City with Software Agents
—In the future smart city, new information and communication technologies will enable a better management of the available resources. The future smart grid infrastructure is emer...
Stamatis Karnouskos, Thiago Nass de Holanda
FC
2007
Springer
117views Cryptology» more  FC 2007»
14 years 4 months ago
Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer
Keylogging and phishing attacks can extract user identity and sensitive account information for unauthorized access to users’ financial accounts. Most existing or proposed solut...
Mohammad Mannan, Paul C. van Oorschot
OTM
2005
Springer
14 years 3 months ago
Reasoning on Dynamically Built Reasoning Space with Ontology Modules
Several applications require reasoning over autonomously developed ontologies. Initially conceived to explicit the semantics of a certain domain, these ontologies become a powerfu...
Fabio Porto