Sciweavers

346 search results - page 47 / 70
» A Privacy Policy Model for Enterprises
Sort
View
CCS
2000
ACM
14 years 19 hour ago
Implementing a distributed firewall
Conventional firewalls rely on topology restrictions and controlled network entry points to enforce traffic filtering. Furthermore, a firewall cannot filter traffic it does ...
Sotiris Ioannidis, Angelos D. Keromytis, Steven M....
JUCS
2006
102views more  JUCS 2006»
13 years 7 months ago
A Mechanism for Solving Conflicts in Ambient Intelligent Environments
: Ambient Intelligence scenarios describe situations in which multitude of devices and agents live together. In this kind ofscenarios is frequent to see the appearance ofconflicts ...
Pablo A. Haya, Germán Montoro, Abraham Esqu...
APCCM
2006
13 years 9 months ago
Process modelling: the deontic way
Current enterprise systems rely heavily on the modelling and enactment of business processes. One of the key criteria for a business process is to represent not just the behaviour...
Vineet Padmanabhan, Guido Governatori, Shazia Wasi...
IUI
2004
ACM
14 years 1 months ago
Ontology modeling tool with concept dictionary
The usefulness of ontology is strongly dependent on the knowledge representation policy and its maintenance. The subject of knowledge representation and modeling tool has been one...
Yoichi Hiramatsu, Seiji Koide
ESWA
2011
220views Database» more  ESWA 2011»
12 years 11 months ago
Unsupervised neural models for country and political risk analysis
This interdisciplinary research project focuses on relevant applications of Knowledge Discovery and Artificial Neural Networks in order to identify and analyse levels of country, b...
Álvaro Herrero, Emilio Corchado, Alfredo Ji...