Sciweavers

366 search results - page 29 / 74
» Access Policy Design Supported by FCA Methods
Sort
View
IFIP
1992
Springer
14 years 24 days ago
Intelligent Access to Data and Knowledge Bases via User's Topics of Interest
Retrieving relevant information in Data and Knowledge Bases containing a large number of di erent types of information is a non trivial problem. That is the reason why, in areas l...
Sylvie Cazalens, Robert Demolombe
CAD
2000
Springer
13 years 8 months ago
The Enterprise-Web portal for life-cycle support
As we enter the new millennium, the approach to product development is evolving rapidly. Companies are in the process of creating a distributed design and manufacturing environmen...
Mohsen Rezayat
ER
2004
Springer
169views Database» more  ER 2004»
14 years 2 months ago
Intentional Modeling to Support Identity Management
Identity management has arisen as a major and urgent challenge for internet-based communications and information services. Internet services involve complex networks of relationshi...
Lin Liu, Eric S. K. Yu
TMC
2010
179views more  TMC 2010»
13 years 7 months ago
On Fast and Accurate Detection of Unauthorized Wireless Access Points Using Clock Skews
We explore the use of clock skew of a wireless local area network access point (AP) as its fingerprint to detect unauthorized APs quickly and accurately. The main goal behind usi...
Suman Jana, Sneha Kumar Kasera
ICSE
2001
IEEE-ACM
14 years 1 months ago
Engineering Mobile-Agent Applications via Context-Dependent Coordination
: The design and development of Internet applications, requiring dynamic and possibly mobile access to Internet resources, can take advantage of an approach based on autonomous mob...
Giacomo Cabri, Letizia Leonardi, Franco Zambonelli