Sciweavers

372 search results - page 25 / 75
» A Reference Model for Firewall Technology
Sort
View
OTM
2005
Springer
14 years 1 months ago
Colored Petri Nets to Verify Extended Event-Driven Process Chains
Business processes are becoming more and more complex and at the same time their correctness is becoming a critical issue: The costs of errors in business information systems are g...
Kees M. van Hee, Olivia Oanea, Natalia Sidorova
DBSEC
2000
153views Database» more  DBSEC 2000»
13 years 9 months ago
Protecting Privacy from Continuous High-resolution Satellite Surveillance
Privacy refers to controlling the dissemination and use of personal data, including information that is knowingly disclosed, as well as data that are unintentionally revealed as a ...
Soon Ae Chun, Vijayalakshmi Atluri
KES
2006
Springer
13 years 7 months ago
A computational framework for package planning
We consider a novel class of applications where a set of activities conducted by a group of people over a time period needs to be planned, taking into account each member's p...
Yang Xiang, Michael Janzen
SIGIR
2005
ACM
14 years 1 months ago
Search engines and how students think they work
To investigate the nature of people’s understandings for how search engines work, we collected data from 232 undergraduate and graduate students. Students were asked to “draw ...
Efthimis N. Efthimiadis, David G. Hendry
GI
2004
Springer
14 years 1 months ago
Vision as an Exercise in Organic Computing
Abstract: The vision process is very complex and requires for its realization in artificial systems a fundamentally new technology for systems generation. This must be based on pr...
Christoph von der Malsburg