Sciweavers

2849 search results - page 88 / 570
» As We Should Have Thought
Sort
View
TRUSTBUS
2010
Springer
13 years 8 months ago
Extending XACML Access Control Architecture for Allowing Preference-Based Authorisation
: European data protection regulation states that organisations must have data subjects’ consent to use their personally identifiable information (PII) for a variety of purposes....
Gina Kounga, Marco Casassa Mont, Pete Bramhall
PODS
2011
ACM
229views Database» more  PODS 2011»
13 years 23 days ago
On the complexity of privacy-preserving complex event processing
Complex Event Processing (CEP) Systems are stream processing systems that monitor incoming event streams in search of userspecified event patterns. While CEP systems have been ad...
Yeye He, Siddharth Barman, Di Wang, Jeffrey F. Nau...
HOTOS
2009
IEEE
14 years 1 months ago
Hierarchical File Systems Are Dead
For over forty years, we have assumed hierarchical file system namespaces. These namespaces were a rudimentary attempt at simple organization. As users have begun to interact with...
Margo I. Seltzer, Nicholas Murphy
MICAI
2007
Springer
14 years 4 months ago
A New Hybrid Summarizer Based on Vector Space Model, Statistical Physics and Linguistics
In this article we present a hybrid approach for automatic summarization of Spanish medical texts. There are a lot of systems for automatic summarization using statistics or lingui...
Iria da Cunha, Silvia Fernández, Patricia V...
SIGSOFT
2004
ACM
14 years 10 months ago
Merging partial behavioural models
Constructing comprehensive operational models of intended system behaviour is a complex and costly task. Consequently, practitioners have adopted techniques that support increment...
Marsha Chechik, Sebastián Uchitel